WO2022021534A1 - Data reading method, storage medium, and mobile terminal - Google Patents
Data reading method, storage medium, and mobile terminal Download PDFInfo
- Publication number
- WO2022021534A1 WO2022021534A1 PCT/CN2020/113463 CN2020113463W WO2022021534A1 WO 2022021534 A1 WO2022021534 A1 WO 2022021534A1 CN 2020113463 W CN2020113463 W CN 2020113463W WO 2022021534 A1 WO2022021534 A1 WO 2022021534A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- privacy
- mobile terminal
- storage area
- identifier
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1451—Management of the data involved in backup or backup restore by selection of backup contents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Definitions
- the present application relates to the field of communication technologies, and in particular, to a data reading method, a storage medium and a mobile terminal.
- the boot mode (Direct Boot Mode) is Andriod
- the newly introduced feature in N refers to a new mode that the terminal device enters at the stage after the terminal device is started until the user unlocks it.
- the terminal device only allows some basic applications to run, such as alarm clock, SMS, phone and other applications; while most other applications are not allowed to run; this is a user privacy issue.
- some basic applications will not be able to obtain the required relevant data, such as related privacy data, etc., resulting in the corresponding application being unavailable or abnormal or defective in use.
- the Emergency Contacts application as an emergency function, is allowed to run in an unlocked state, i.e. in boot mode.
- the contact database it relies on contains a large amount of personal private data, which is not allowed to be exposed in the unlocked state, resulting in the failure of the emergency call function corresponding to the emergency contact application in the startup mode.
- the embodiments of the present application provide a data reading method, a storage medium, and a mobile terminal, which can solve the problems that the application program cannot be used in the startup mode, or that the use is abnormal or defective.
- the embodiment of the present application provides a data reading method, including:
- the mobile terminal When running the preset application, if the mobile terminal is in the startup mode, the private data is read from the encrypted storage area of the device.
- the data reading method further includes: if the mobile terminal is in a normal mode, reading the privacy data from a credential encryption storage area in the normal mode.
- the data reading method further includes:
- the mobile terminal If the mobile terminal is in the startup mode, monitor a broadcast message of mode switching, and the mode is switched from the startup mode to the normal mode of the mobile terminal;
- the privacy data is read from the credential encryption storage area in the normal mode.
- the obtaining the privacy data of the preset application includes:
- acquiring the privacy data to be used by the preset application in the startup mode of the mobile terminal includes:
- the privacy data to be added by the preset application program to be used in the startup mode of the mobile terminal is acquired according to the data addition instruction.
- the obtaining the privacy data of the preset application includes: obtaining the privacy data and the privacy data identifier corresponding to the privacy data;
- the backing up the privacy data to the device encryption storage area in the startup mode of the mobile terminal includes: backing up the privacy data and the privacy data identifier to the device encryption storage area in the startup mode of the mobile terminal Area.
- the method further includes:
- the privacy data identifier If the privacy data identifier is included, obtain the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier;
- the private data is operated according to the operation type and the data to be operated.
- the data operation instruction is a data addition instruction
- the operation type is new addition
- the data to be operated includes the data to be added
- the data identifier corresponding to the data to be operated includes the data identifier of the data to be added
- Detecting whether the data identifier includes a privacy data identifier includes: acquiring the data identifier of the data to be added, determining that the data identifier includes a privacy data identifier according to the data identifier, and using the data identifier as a privacy data identifier;
- the obtaining the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier includes: obtaining, according to the privacy data identifier, the privacy data to be used by a preset application in the startup mode of the mobile terminal, and storing the data.
- the private data to be used in the startup mode is used as the corresponding private data in the encrypted storage area of the device;
- the operation on the private data according to the operation type and the data to be operated includes: backing up the private data identifier and the private data to an encrypted storage area of the device in the startup mode.
- the data operation instruction is a data update instruction
- the operation type is update
- the to-be-operated data includes the to-be-updated data
- the data identifier corresponding to the to-be-operated data includes the data identifier of the to-be-updated data
- Detecting whether the data identifier includes a privacy data identifier includes: acquiring the data identifier of the data to be updated, and determining the privacy data identifier according to the acquired data identifier;
- Operating the private data according to the operation type and the data to be operated includes: updating the corresponding private data in the encrypted storage area of the device in the startup mode according to the data to be updated.
- the data operation instruction is a data deletion instruction
- the operation type is deletion
- the to-be-operated data includes the to-be-deleted data
- the data identifier corresponding to the to-be-operated data includes the data identifier of the to-be-deleted data
- Detecting whether the data identifier includes a privacy data identifier includes: acquiring the data identifier of the data to be deleted, and determining the privacy data identifier according to the acquired data identifier;
- Operating the private data according to the operation type and the data to be operated includes: deleting the corresponding private data in the encrypted storage area of the device in the startup mode according to the data to be deleted.
- Embodiments of the present application further provide a computer-readable storage medium, where a plurality of instructions are stored in the computer-readable storage medium, and the instructions are suitable for being loaded by a processor to execute any one of the above data reading methods.
- An embodiment of the present application further provides a mobile terminal, including a processor and a memory, the processor is electrically connected to the memory, the memory is used for storing instructions and data, the processor is used for running the instructions and The data is called to perform the steps in the data reading method described in any one of the above.
- the data reading method, storage medium and mobile terminal provided by this application can obtain the privacy data of the preset application program; back up the privacy data to the device encrypted storage area in the startup mode of the mobile terminal; when running the preset application program, if When the mobile terminal is in the startup mode, the private data is read from the encrypted storage area of the device. It is understandable that the private data of the preset application is extracted and backed up to the storage space of the encrypted storage area of the device in the startup mode, so that the private data can be read in the direct startup mode. It runs normally in the direct boot mode, and solves the problems that the application cannot be used or the use is abnormal or defective in the direct boot mode, and improves the user experience.
- FIG. 1a is a schematic flowchart of a data reading method provided by an embodiment of the present application.
- FIG. 1b is a first example diagram of reading private data by a preset application provided by an embodiment of the present application.
- FIG. 1c is a second example diagram of reading private data by a preset application provided by an embodiment of the present application.
- FIG. 2 is another schematic flowchart of a data reading method provided by an embodiment of the present application.
- FIG. 3 is another schematic flowchart of a data reading method provided by an embodiment of the present application.
- FIG. 4a is a schematic flowchart of adding privacy data to a preset application according to an embodiment of the present application.
- FIG. 4b is a schematic flowchart of updating privacy data by a preset application according to an embodiment of the present application.
- FIG. 5a is a schematic flowchart of adding an emergency contact to an emergency contact application provided by an embodiment of the present application.
- FIG. 5b is a schematic flowchart of an emergency contact application update emergency contact provided by an embodiment of the present application.
- FIG. 6a is a schematic flowchart of adding contact information to a phone application according to an embodiment of the present application.
- FIG. 6b is a schematic flowchart of updating contact information by a phone application according to an embodiment of the present application.
- FIG. 6c is a schematic flowchart of a phone application querying contact information according to an embodiment of the present application.
- FIG. 7 is a schematic structural diagram of a data reading apparatus provided by an embodiment of the present application.
- FIG. 8 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
- FIG. 9 is another schematic structural diagram of a mobile terminal according to an embodiment of the present application.
- Embodiments of the present application provide a data reading method, device, storage medium, and mobile terminal.
- Any of the data reading apparatuses provided in the embodiments of the present application may be integrated in a mobile terminal, and the mobile terminal may include terminal devices such as a smart phone, a Pad, a wearable device, and a robot.
- the mobile terminal includes a preset application program, and the preset application program can run in a startup mode (Direct Boot Mode) of the mobile terminal.
- the mobile terminal is a mobile terminal installed with an Android system.
- FIG. 1a is a schematic flowchart of a data reading method provided by an embodiment of the present application, which is applied to a mobile terminal, and the data reading method includes steps 101 to 105, which may be specifically as follows:
- Preset applications refer to applications that can be run in the startup mode of the mobile terminal, such as some basic applications in the mobile terminal, including applications such as alarm clocks, emergency contacts, text messages, and phone calls.
- the private data includes the personal data related to the mobile terminal user, such as contact information, communication friend information, and communication information communicated with the communication friend stored on the mobile terminal.
- the emergency contact application adds one or more contacts in the contact database (the database used for storing contact information in the mobile terminal, commonly known as the phone book) as Emergency contacts, and provide relevant entrances when the screen is locked, so that mobile terminal users can quickly call emergency contacts.
- the privacy data includes emergency contact information that can be contacted in an emergency
- the emergency contact information is consistent with the corresponding contact information in the contact database, and specifically includes the contact name, contact phone number, contact email, contact information One or more information such as person unit, contact picture, contact QR code, etc.
- the privacy data corresponding to the phone application includes the contact information in the contact database, and each contact information specifically includes the name of the contact, the phone number of the contact in the corresponding contact database One or more of the information, such as number, contact email, contact unit, contact picture, contact QR code, etc.
- the privacy data corresponding to the phone application also includes information such as call records.
- the private data of the preset application can be obtained in various ways. Before describing how to obtain the private data of the preset application, first describe the startup mode and normal mode of the mobile terminal, and the area where the mobile terminal stores data.
- Direct Boot Mode also called direct boot mode, refers to a new mode entered after the mobile terminal is started, until the mobile terminal user unlocks the mobile terminal and the mode ends.
- the normal mode also called the non-direct boot mode or the non-direct boot mode, refers to the mode corresponding to the stage after the mobile terminal user unlocks the mobile terminal.
- the mobile terminal In order to support the startup mode, the mobile terminal provides two areas for storing data in advance:
- Credential encrypted storage also referred to as CE storage area, the storage area where the mobile terminal stores data by default, and can also be understood as the default storage location, which can only be used after the mobile terminal user unlocks the mobile terminal. Storage space, which is available in normal mode. As shown in Figure 1b, the preset application can normally read and write data stored in the credential encrypted storage area (the default storage location) in normal mode.
- DE storage Device encrypted storage
- the data that the default application needs to use in startup mode can be stored in the device's encrypted storage area.
- private data such as contact information in the contact database, call records, communication friend information, communication information with communication friends, etc.
- the private data of the preset application is placed in the storage area where the data is stored by default, that is, the credential encryption storage area.
- the data of the credential encrypted store cannot be read.
- the default application cannot normally read and write data stored in the credential encrypted storage area (the default storage location) in boot mode.
- step 101 includes: obtaining the privacy data of the preset application program from the credential encryption storage area in the normal mode of the mobile terminal; or
- the privacy data to be added by the preset application program is acquired according to the data addition instruction.
- the privacy data of the preset application is obtained from the credential encryption storage area in the normal mode of the mobile terminal.
- the preset application is an emergency contact application
- the private data of the emergency contact application that is, the corresponding emergency contact information
- the credential encryption storage area in the normal mode of the mobile terminal For the phone application, the private data of the phone application, that is, all the corresponding contact information, is obtained from the credential encryption storage area in the normal mode of the mobile terminal.
- the data addition instruction of the preset application program carries the privacy data to be added by the preset application program, and the privacy data to be added by the preset application program is obtained according to the data addition instruction.
- the data addition instruction of the phone application carries the privacy data to be added, such as the contact information to be added or the call record information to be added
- the data addition instruction is used It is used to store the carried contact information to be added in the contact database, or to store the call record information to be added. In this way, if a data addition instruction of the phone application program is received, the contact information to be added or the call record information to be added of the phone application program is acquired according to the data addition instruction.
- the data addition instruction of the contact information to be added can be triggered by the save control on the new interface corresponding to the contact database, that is, trigger the save control on the new interface corresponding to the contact database to trigger the data addition instruction.
- the data addition instruction of the call record information to be added may be generated when an outgoing call or an incoming call is detected.
- step 101 includes: obtaining the privacy data of the preset application and the privacy data identifier corresponding to the privacy data from the credential encryption storage area in the normal mode of the mobile terminal; or
- the privacy data newly added by the preset application program and the privacy data identifier corresponding to the privacy data are obtained according to the data addition instruction.
- the privacy data includes a corresponding privacy data identifier, and the privacy data identifier can uniquely identify the privacy data.
- the private data is contact information
- the private data identifier corresponds to the identification information of each contact.
- the external Uniform Resource Identifier (URI) of the contact can be used as the privacy data identifier
- the identifier (storage number, etc.) corresponding to the contact information stored in the contact database can also be used as the privacy data identifier
- the Contact phone numbers as privacy data identifiers, etc.
- the emergency contact application program and the phone application program mentioned in the embodiments of this application are only examples of preset application programs, so as to facilitate the understanding of the content in the embodiments of this application, they do not constitute a preset application program. Program limitations.
- the acquired preset application After acquiring the private data of the preset application, back up the private data to the device encrypted storage area in the startup mode of the mobile terminal. Understandably, since the data in the device encrypted storage area in the startup mode of the mobile terminal can be used in both the startup mode and the normal mode, in one case, the acquired preset application The private data is only stored in the encrypted storage area of the device in the startup mode, thus reducing the occupied storage space of the mobile terminal. Correspondingly, when obtaining private data, it is obtained from the encrypted storage area of the device.
- the privacy data of the preset application is stored not only in the device encrypted storage area in the startup mode, but also in the credential encrypted storage area in the normal mode, so that it is convenient for other applications to use the credential encrypted storage area in the normal mode to store in the encrypted storage area. privacy data and improve usability. Understandably, on the basis of storing private data in the credential encrypted storage area in normal mode, the corresponding private data is obtained and backed up to the encrypted storage area of the device. The bad influence caused by the inability to obtain the private data in the credential encryption storage area in the normal mode in the normal mode improves the user experience. Specifically, as shown in FIG.
- the privacy data of the preset application is stored in both the credential encrypted storage area in the normal mode and the device encrypted storage area in the startup mode.
- preference is given to private data stored in the credential encrypted store (the default storage location).
- boot mode private data stored in the device's encrypted storage is used in the form of single-app dual data storage.
- the private data can be backed up to the device encryption storage area in the startup mode of the mobile terminal, and stored in the form of key-value pairs. If the amount of private data is relatively small, SharedPreference can be used to store it. Correspondingly, the private data will be automatically stored in the encrypted storage area of the device.
- SharedPreference referred to as SP
- SP is a storage method provided by the Android system to store some simple configuration information.
- the Map data structure is used to store data, which is stored in the form of key-value pairs, and the data is stored in the mobile terminal in XML format, and the corresponding storage file is stored in /data/data/ ⁇ package name>/shared_prefs directory. It is suitable for single process, small batch data storage and access.
- step 102 includes: backing up the privacy data and the corresponding privacy data identifier to the device encryption storage area in the startup mode of the mobile terminal.
- the mobile terminal runs the preset application program, it is detected whether the mobile terminal is in the startup mode. Wherein, whether the mobile terminal is in the startup mode can be detected by a preset function, and the preset function is UserManager. isUserUnlocked().
- the mobile terminal If the mobile terminal is in the normal mode, read privacy data from the credential encryption storage area in the normal mode. That is, if it is detected that the mobile terminal is in the normal mode, the private data is read from the storage area where the data is stored by default, that is, the credential encryption storage area.
- the mobile terminal If the mobile terminal is in the startup mode, read the private data from the encrypted storage area of the device in the startup mode. That is, if it is detected that the mobile terminal is currently in the startup mode, it can be understood that the mobile terminal is in the stage after startup but not unlocked, and correspondingly, the private data is read from the encrypted storage area of the device.
- steps 103 to 105 may be understood as corresponding to the steps related to querying private data.
- the private data of the preset application is extracted and backed up to the storage space of the device encrypted storage area in the boot mode, so that the private data can be read from the device encrypted storage area in the direct boot mode.
- the preset application program can run normally in the direct startup mode, so as to solve the problems that the application cannot be used in the direct startup mode, or have abnormal usage or defects, and improve the user experience.
- the data reading method includes steps 201 to 206, which may be specifically as follows:
- the private data that the emergency contact application needs to use in the startup mode of the mobile terminal includes the contact phone number.
- Emergency contact application to dial the phone number, quickly call emergency contacts, and realize emergency calling function.
- the private data to be used by the emergency contact application in the startup mode of the mobile terminal may further include the contact name, so that when the emergency contact is called, the contact name is displayed at the same time, so as to improve the user experience.
- the privacy data identifier of the emergency contact application refers to the identification information of each emergency contact. It can be understood that the emergency contact information includes multiple different pieces of information, and the multiple different pieces of information are not necessarily required to be used in the startup mode. Therefore, only private data to be used by the emergency contact application in the startup mode is obtained.
- the privacy data that the phone application needs to use in the startup mode of the mobile terminal includes the contact phone number. Understandably, with the contact phone number, it is possible to communicate with the contact. Telephone communication, realize the corresponding voice communication function.
- the privacy data to be used by the phone application in the startup mode of the mobile terminal may also include the contact name, so that when the phone communicates with the contact, the contact name is displayed at the same time, and the corresponding contact name and the corresponding contact name are displayed in the call record.
- Contact phone number to improve user experience.
- the privacy data identification of the phone application refers to identification information of each contact. Likewise, it is understandable that only the private data that the phone application needs to use in the startup mode is obtained.
- the privacy data to be used by the preset application in step 201 in the startup mode of the mobile terminal compared with the privacy data of the preset application in step 101, the privacy data to be used in the startup mode is different.
- the corresponding set is less than or equal to the set corresponding to the privacy data of the preset application.
- step 201 includes: obtaining private data to be used by a preset application in the startup mode of the mobile terminal from the credential encryption storage area in the normal mode of the mobile terminal; or
- the privacy data to be added by the preset application program and to be used in the startup mode of the mobile terminal is obtained.
- the private data that the preset application program needs to use in the startup mode of the mobile terminal obtained from the credential encryption storage area in the normal mode of the mobile terminal is backed up to the device encryption storage area in the startup mode.
- the privacy data to be added needs to be saved. to the default storage location, which is the credential encrypted storage area.
- the set of privacy data to be used by the preset application obtained in step 201 in the startup mode of the mobile terminal is less than or equal to the set of privacy data of the preset application in step 101
- the set of privacy data to be used in the startup mode is After the private data is backed up to the encrypted storage area of the device, the private data that the preset application needs to use in the startup mode can be obtained when the preset application is running, which ensures the normal operation of the preset application; at the same time, it can maximize the It protects the privacy of user data and minimizes the exposure of private data; it also reduces the consumption of unnecessary storage space and reduces the storage space for mobile terminals to store private data.
- the privacy data identification is also backed up, so that the corresponding privacy data can be queried more conveniently and quickly according to the privacy data identification, and it is convenient to synchronize the privacy data corresponding to the privacy data identification in the encrypted storage area of the certificate and the encrypted storage area of the device. Such as synchronous update and so on.
- Corresponding private data can be quickly read from the credential encrypted storage area according to the private data identifier.
- Corresponding private data can be quickly read from the encrypted storage area of the device according to the private data identifier.
- the mobile terminal is in the startup mode, it means that the mobile terminal is in the stage after startup but before unlocking.
- the user unlocking is an irregular behavior.
- the startup mode is the mode corresponding to the stage after the mobile terminal is started but not unlocked, there is only one case of mode switching, that is, when the mobile terminal is successfully unlocked, the startup mode of the mobile terminal is switched to the normal mode.
- the user of the mobile terminal opens the preset application in the startup mode, and the preset application reads private data from the device encrypted storage area. After the mobile terminal user successfully unlocks the mobile terminal, the mobile terminal has entered the normal mode. If no mode switching is detected, the mobile terminal still reads the private data in the startup mode, which may lead to a bad user experience. So in the process of mode switching, how to deal with it?
- the broadcast message of the monitoring mode switch is "android.intent.action.USER_ UNLOCKED", this broadcast message can monitor the mode switching of the mobile terminal user from the startup mode of the mobile terminal to the normal mode.
- the mode switching broadcast message if the mode switching broadcast message is monitored, re-read the privacy data from the credential encryption storage area in the normal mode according to the privacy data identifier.
- the private data is read from the credential encryption storage area again according to the private data identifier to complete the switching of private data reading and improve the user experience. If the broadcast message of the mode switch is not monitored, the monitoring will continue.
- the acquired privacy data is the privacy data that the preset application program needs to use in the startup mode; and further defines the processing of special cases, that is, when two modes are involved in the mode switching, the privacy data is read. handling of the situation.
- FIG. 3 is another schematic flowchart of a data reading method provided by an embodiment of the present application.
- the data reading method includes the following steps:
- a data operation instruction in the credential encryption storage area of the mobile terminal is received, determine the operation type, the data to be operated, and the data identifier corresponding to the data to be operated according to the data operation instruction.
- the data operation instruction carries information such as the operation type, the data to be operated, and the data identifier corresponding to the data to be operated, and the operation type, the data to be operated, and the data identifier corresponding to the data to be operated are determined according to the data operation instruction.
- the data operation instructions include data update instructions and data deletion instructions, etc., and further include privacy data update instructions and privacy data deletion instructions, and the corresponding operation types include privacy data update and privacy data deletion.
- the data to be operated correspondingly, includes the data to be updated and the data to be deleted.
- the data to be operated involves contact information, that is, the data to be operated includes contact information; the operation of the contact information, specifically, the contact information in the contact database Person information to operate; correspondingly, the data identification corresponding to the data to be operated is the identification information of the contact to be operated.
- the corresponding data to be operated also includes call records and the like.
- the private data may be backed up from the credential encrypted storage area in the normal mode to the device encrypted storage area in the boot mode, and the set of private data in the credential encrypted storage area is greater than or equal to the privacy of the device encrypted storage area.
- a collection of data, so, in general, synchronization is required when operating on private data in a credential encrypted store.
- the data to be operated may not involve the private data saved in the encrypted storage area of the device, it is necessary to detect whether the data identifier to be operated includes the private data identifier. For example, for the emergency contact application, when the contact information in the contact database in the credential encrypted storage area needs to be operated, the data to be operated may not be the emergency contact involved in the emergency contact application.
- the data identifier does not include the privacy data identifier, directly perform an operation matching the operation type on the data to be operated in the credential encryption storage area according to the prior art; if the privacy data identifier is included, go to step 303; The technology performs an operation matching the operation type on the data to be operated in the credential encrypted storage area.
- the private data identifier Since the private data identifier has a corresponding association relationship with the private data, the corresponding private data in the encrypted storage area of the device can be obtained through the private data identifier.
- If the operation type is an update operation, update the private data in the encrypted storage area of the device according to the data to be updated; if the operation type is delete, delete the private data in the encrypted storage area of the device according to the data to be deleted.
- This embodiment further defines how to update and delete the private data in the encrypted storage area of the device when the private data in the encrypted storage area of the credentials needs to be updated and deleted, so as to realize the encrypted storage area of the device and the encrypted storage area of the credentials. synchronization of private data.
- the above embodiments relate to the processing of adding, updating and deleting the private data of the preset application in the device encrypted storage area in the startup mode.
- the following will describe the operation steps for processing the privacy data in the credential encrypted storage area by the corresponding preset application program (also referred to as the original operation steps or native operation steps) and the operation steps for processing private data in the encrypted storage area of the device (may be referred to as new operation steps).
- new operation steps are added on the basis of the original operation steps of the preset application (such as addition, deletion, modification, search, etc.).
- the steps in the following native operation steps and newly added operation steps are just simple examples, and may also include more detailed steps.
- FIG. 4a corresponds to a schematic diagram of a processing flow of adding privacy data of a preset application
- FIG. 4b corresponds to a schematic diagram of a processing flow of updating privacy data of a preset application.
- the processing flow of the newly added privacy data of the default application includes the following steps:
- the data to be added (contact information to be added) is added to the contact database in the credential encryption storage area in the normal mode.
- All the data to be added can be regarded as private data, or part of the data to be added can be regarded as private data.
- steps 411-412 correspond to the original operation steps of the default application
- steps 413-415 correspond to newly-added operation steps.
- the processing flow of updating privacy data of the preset application includes the following steps:
- steps 421 to 422 correspond to the original operation steps of the default application
- steps 423 to 425 correspond to newly added operation steps.
- steps 421 to 422 correspond to the original operation steps of the default application
- steps 423 to 425 correspond to newly added operation steps.
- the processing flow of the preset application program further includes the processing flow of deleting private data of the preset application program.
- the processing flow of deleting private data of the preset application is consistent with the processing flow of updating private data of the preset application. It can be understood that, in the processing flow of deleting privacy data of the preset application, the data update instruction in the corresponding step of the processing flow of updating the privacy data of the preset application is correspondingly changed to a data deletion instruction, and the data to be updated is changed accordingly. The corresponding change is to the data to be deleted, and the corresponding update is changed to delete, etc. For the sake of brevity, details are not repeated here.
- the mobile terminal user adds one or more contact information in the contact database to the emergency contact application, and can quickly find and make outgoing calls in case of emergencies.
- the native implementation logic of the emergency contact application is to use SharedPreference in the device encrypted storage area to store the identification information of the contact, such as the URI of the contact; when running the emergency contact application, the URI is used to match and query the contact database. the corresponding contact information.
- the Emergency Contacts application does not work properly in boot mode because the contacts database cannot be queried in boot mode.
- the embodiment of the present application can adopt at least two solutions to solve the problem that the emergency contact application cannot work normally in the startup mode: 1. Back up the corresponding emergency contact information in the contact database from the credential encrypted storage area to the device encrypted storage area In this way, the emergency contact application can obtain the emergency contact information from the device encrypted storage area in the startup mode; 2. Obtain the private data that the emergency contact application needs to use in the startup mode from the credential encrypted storage area, such as The contact name and contact phone number of the emergency contact, etc., back up the private data that the emergency contact application needs to use in the startup mode to the device encryption storage area, so that the emergency contact application can be encrypted from the device in the startup mode. The storage area obtains the private data to be used.
- FIG. 5a corresponds to a schematic diagram of the processing flow of adding an emergency contact by the emergency contact application
- FIG. 5b corresponds to the processing flow diagram of the emergency contact application updating an emergency contact.
- the processing flow of adding an emergency contact to the emergency contact application includes:
- the identification information of the emergency contact Acquire the identification information of the emergency contact, and save the identification information of the emergency contact to the device encryption storage area in the startup mode. For example, if the identification information of the emergency contact is saved to the device encrypted storage area by using SharedPreference, the identification information may be the URI of the contact.
- the private data to be used in boot mode includes contact phone number, contact name, etc.
- steps 511-512 correspond to the original operation steps of the emergency contact application
- steps 513-514 correspond to newly-added operation steps.
- the processing flow of the emergency contact application for updating emergency contacts includes the following steps:
- the identification information stored in the corresponding SharedPreference in the device encryption storage area is updated.
- the identification information is the identification information saved in the native operation step.
- steps 521 to 522 correspond to the original operation steps of the emergency contact application
- step 523 corresponds to the newly added operation steps.
- the processing flow of the emergency contact application further includes a processing flow of deleting the emergency contact in the emergency contact application.
- the process of deleting emergency contacts in the emergency contacts application is the same as the process of updating emergency contacts in the emergency contacts application. It can be understood that in the processing flow of the emergency contact application program for deleting emergency contacts, the data update instruction in the corresponding steps of the emergency contact application program's processing flow for updating emergency contacts is correspondingly changed to a data deletion instruction, Change the to-be-updated correspondence to to-be-deleted, and the update correspondence to be changed to delete, etc. For the sake of brevity, details are not repeated here.
- the processing flow of the emergency contact inquiring about the emergency contact information includes: when the emergency contact application is running, such as when the emergency contact list is displayed, detecting whether the mobile terminal is in the startup mode; if the mobile terminal is in the startup mode, encrypting storage from the device Read the private data corresponding to the emergency contact information in the area. For example, read the private data corresponding to the emergency contact information from the SharedPreference corresponding to the encrypted storage area of the device.
- the private data includes the contact name and contact phone number of the emergency contact. etc.; if the mobile terminal is in the normal mode, the private data corresponding to the emergency contact is read from the default storage location, specifically, the corresponding private data is read from the contact database in the credential encrypted storage area. In this way, the private data corresponding to the emergency contact can be read no matter in the startup mode or in the normal mode, so that the emergency contact application can run normally in both modes.
- the phone application is the basic function of the mobile terminal, it is the basis for emergency calls, and it is allowed to operate in the activated mode.
- the contact database in the encrypted storage area of the credentials cannot be read. Therefore, the contact matching operation cannot be performed. That is, in the startup mode, the call interface can only display the phone number, and it is not known who to call again. Causes the phone application to have a usage bug in boot mode.
- the embodiments of the present application can adopt at least two solutions to solve the problem that the phone application has usage defects in the startup mode: 1. Back up all the contact information/added contact information in the contact database to the phone application in the startup mode. The device encrypted storage area, so that the phone application can obtain each contact information from the device encrypted storage area in startup mode; 2. Obtain the private data that the phone application needs to use in startup mode, such as contact name and contact Backup the private data that the phone application needs to use in the startup mode to the device encrypted storage area, so that the phone application can display the contact name and contact phone number and other information when making a call in the startup mode.
- scheme 2 is used.
- SharedPreference is used to store private data that the phone application needs to use in startup mode.
- the corresponding native operation steps and new operation steps of the phone application when adding, updating and deleting contact information will be briefly introduced.
- FIG. 6a corresponds to a schematic diagram of the processing flow of adding contact information by the phone application
- FIG. 6b corresponds to the processing flow diagram of the phone application to update contact information
- FIG. 6c corresponds to A schematic diagram of the processing flow of the phone application querying contact information.
- the processing flow of adding contact information by the phone application includes the following steps:
- the privacy data to be used in the startup mode includes a contact name, a contact phone number, and the like.
- step 614 Detect, according to the identification information, whether the private data to be used has been stored in the device encrypted storage area. If no, go to step 615; if yes, go to step 616.
- the encrypted storage area of the device in the update startup mode corresponds to the private data corresponding to the contact information in the SharedPreference.
- steps 611 to 612 correspond to the original operation steps of the phone application
- steps 613 to 616 correspond to newly added operation steps.
- the processing flow of updating the contact information by the phone application includes:
- steps 621-622 correspond to the native operation steps of the phone application
- steps 623-624 correspond to newly-added operation steps.
- the processing flow of the phone application further includes the processing flow of deleting the contact information of the phone application.
- the processing flow of deleting contact information of the phone application is the same as the processing flow of updating contact information of the phone application. It can be understood that, in the processing flow of deleting contact information of the phone application, the data update instructions in the corresponding steps of the processing flow of updating contact information of the above-mentioned phone application are correspondingly changed to data deletion instructions, and the corresponding steps to be updated are changed. Change it to pending deletion, and change the update correspondence to deletion, etc. For brevity, they will not be repeated here.
- the processing flow for querying contact information by the phone application includes the following steps:
- the phone application program starts a call interface, and acquires identification information of the caller contact, such as the phone number of the caller contact.
- the private data corresponding to the incoming call contact is read from the SharedPreference corresponding to the encrypted storage area of the device.
- the private data of the incoming call contact stored in the encrypted storage area of the device includes information to be used in the startup mode, such as the name of the contact, the phone number of the contact, and the like.
- step 635 is executed.
- step 634 If in the normal mode, read the private data of the incoming contact from the contact database in the credential encrypted storage area according to the identification information of the incoming contact. Next, step 635 is executed.
- the data reading device may be implemented as an independent entity, or may be integrated in a mobile terminal.
- the mobile terminal may include Smartphones, Pads, wearable devices, robots and other terminal devices.
- the mobile terminal includes a preset application program, and the preset application program can run in a startup mode (Direct Boot Mode) of the mobile terminal. It's important to note that preset apps that can run in boot mode must work in normal mode.
- the mobile terminal is a mobile terminal installed with an Android system.
- FIG. 7 specifically describes the data reading device provided by the embodiment of the present application.
- the data reading device may include an acquisition unit 701 , a backup unit 702 and a reading unit 703 . in:
- the obtaining unit 701 is configured to obtain private data of a preset application.
- the obtaining unit 701 is specifically configured to obtain the privacy data of the preset application program from the credential encryption storage area in the normal mode of the mobile terminal; or if a data addition instruction of the preset application program is received, obtain the preset application program according to the data addition instruction The privacy data to be added by the program.
- the obtaining unit 701 is specifically configured to obtain the privacy data of the preset application and the privacy data identifier corresponding to the privacy data from the credential encryption storage area in the normal mode of the mobile terminal; or
- the privacy data newly added by the preset application program and the privacy data identifier corresponding to the privacy data are obtained according to the data addition instruction.
- the obtaining unit 701 is configured to obtain the privacy data to be used by the preset application in the startup mode of the mobile terminal and the privacy data identifier corresponding to the privacy data.
- the obtaining unit 701 is specifically configured to obtain the privacy data to be used by the preset application in the startup mode of the mobile terminal from the credential encryption storage area in the normal mode of the mobile terminal; or
- the privacy data to be added by the preset application program and to be used in the startup mode of the mobile terminal is obtained.
- the backup unit 702 is configured to back up the private data to the device encrypted storage area in the startup mode of the mobile terminal.
- the backup unit 702 is configured to back up the privacy data and the corresponding privacy data identifier to the device encryption storage area in the startup mode of the mobile terminal.
- the reading unit 703 is configured to read privacy data from the device encrypted storage area if the mobile terminal is in the startup mode when running the preset application program; if the mobile terminal is in the startup mode, from the device encrypted storage area in the startup mode Read private data.
- the reading unit 703 is specifically configured to detect whether the mobile terminal is in the startup mode when running the preset application program; if the mobile terminal is in the normal mode, read privacy data from the credential encryption storage area in the normal mode; the mobile terminal is in the startup mode mode, private data is read from the encrypted storage area of the device in boot mode.
- the data reading apparatus may further include a monitoring unit 704 .
- the monitoring unit 704 is configured to, if the mobile terminal is in the activation mode, monitor the broadcast message of the mode switching, the mode switching is to switch from the activation mode to the normal mode.
- the reading unit 703 is further configured to re-read the privacy data from the credential encryption storage area in the normal mode according to the privacy data identifier if the mode switching broadcast message is monitored.
- the data reading apparatus may further include a data operation unit 705 .
- the data operation unit 705 is used to determine the operation type, the data to be operated and the data identifier corresponding to the data to be operated according to the data operation instruction if the data operation instruction of the credential encryption storage area of the mobile terminal is received; to detect whether the data identifier includes privacy Data identifier; if the private data identifier is included, obtain the corresponding private data in the encrypted storage area of the device according to the private data identifier; operate the private data in the encrypted storage area of the device according to the operation type and the data to be operated.
- the data operation unit 705 includes a data addition unit, a data update unit, a data deletion unit, and the like. in,
- the data adding unit is used to receive the data adding instruction of the preset application, and obtain the data to be added; the data to be added is added to the credential encryption storage area in the normal mode; the data identifier of the data to be added is obtained as Privacy data identification; according to the data to be added, obtain the privacy data that the preset application needs to use in the startup mode of the mobile terminal; back up the privacy data identification and privacy data to the device encrypted storage area in the startup mode.
- a data update unit configured to receive a data update instruction of a preset application, and obtain the data to be updated; update the data corresponding to the credential encryption storage area in the normal mode according to the data to be updated; obtain the data identifier of the data to be updated,
- the private data identifier is determined according to the acquired data identifier; the corresponding private data in the device encrypted storage area in the startup mode is obtained through the private data identifier; and the corresponding private data in the device encrypted storage area is updated according to the data to be updated.
- the data deletion unit is used to receive the data deletion instruction of the preset application program and obtain the data to be deleted; according to the data to be deleted, delete the data corresponding to the credential encrypted storage area in the normal mode; to obtain the data identifier of the data to be deleted,
- the privacy data identifier is determined according to the acquired data identifier; the privacy data corresponding to the device encrypted storage area in the startup mode is obtained through the privacy data identifier; the corresponding privacy data in the device encrypted storage area is deleted.
- the above modules and/or units can be implemented as independent entities, or can be arbitrarily combined to be implemented as the same or several entities.
- the specific implementation of the above modules and/or units can refer to the previous method implementation.
- beneficial effects that can be achieved please refer to the beneficial effects in the foregoing method embodiments, which will not be repeated here.
- an embodiment of the present application further provides a mobile terminal, where the mobile terminal may be a device including at least one sensor, such as a smartphone, a tablet computer, and a robot.
- the mobile terminal 800 includes a processor 801 and a memory 802 .
- the processor 801 is electrically connected to the memory 802 .
- the processor 801 is the control center of the mobile terminal 800, uses various interfaces and lines to connect various parts of the entire mobile terminal, and executes the movement by running or loading the application program stored in the memory 802 and calling the data stored in the memory 802. Various functions of the terminal and processing data, so as to monitor the mobile terminal as a whole.
- the processor 801 in the mobile terminal 800 loads the instructions corresponding to the processes of one or more application programs into the memory 802 according to the following steps, and the processor 801 executes the instructions stored in the memory 802 .
- the application program in the above-mentioned data reading method realizes various functions of the steps in any embodiment of the above-mentioned data reading method.
- the mobile terminal can implement the steps in any of the data reading methods provided in the embodiments of the present application, and therefore, can achieve the beneficial effects that can be achieved by any of the data reading methods provided in the embodiments of the present invention. For details, see details The foregoing embodiments are not repeated here.
- FIG. 9 shows a specific structural block diagram of a mobile terminal provided by an embodiment of the present invention, and the mobile terminal can be used to implement the data reading method provided in the above-mentioned embodiment.
- the mobile terminal 900 may be a mobile terminal, a wearable device, a PC terminal with a touch screen, a robot with a touch screen, and the like.
- the mobile terminal includes a touch screen, and the touch screen can be used to receive inputted number or character information.
- the RF circuit 910 is used for receiving and sending electromagnetic waves, realizing mutual conversion between electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices.
- RF circuitry 910 may include various existing circuit elements for performing these functions, eg, antennas, radio frequency transceivers, digital signal processors, encryption/decryption chips, Subscriber Identity Module (SIM) cards, memory, and the like.
- SIM Subscriber Identity Module
- the RF circuit 910 may communicate with various networks such as the Internet, an intranet, a wireless network, or with other devices over a wireless network.
- the aforementioned wireless network may include a cellular telephone network, a wireless local area network, or a metropolitan area network.
- the above-mentioned wireless networks can use various communication standards, protocols and technologies, including but not limited to the Global System for Mobile Communications (Global System for Mobile Communication, GSM), Enhanced Mobile Communication Technology (Enhanced Data GSM Environment, EDGE), Wideband Code Division Multiple Access (Wideband Code Division Multiple Access, WCDMA), code division multiple access technology (Code Division Access, CDMA), Time Division Multiple Access (TDMA), Wireless Fidelity (Wireless Fidelity, Wi-Fi) (e.g.
- GSM Global System for Mobile Communication
- EDGE Enhanced Mobile Communication Technology
- WCDMA Wideband Code Division Multiple Access
- CDMA Code Division Multiple Access
- TDMA Time Division Multiple Access
- Wireless Fidelity Wireless Fidelity
- Wi-Fi Wireless Fidelity
- IEEE 802.11a Institute of Electrical and Electronics Engineers standards IEEE 802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n
- Internet telephony VoIP over Internet Protocol, VoIP
- Worldwide Interconnection for Microwave Access Worldwide Interoperability for Microwave Access, Wi-Max
- other protocols for mail, instant messaging, and short messaging and any other suitable communication protocols, even those that are not currently being developed.
- the memory 920 may be used to store software programs and modules, such as corresponding program instructions/modules in the above embodiments.
- the processor 980 executes various functional applications and data processing by running the software programs and modules stored in the memory 920 .
- Memory 920 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory.
- the memory 920 may further include memory located remotely from the processor 980, and these remote memories may be connected to the mobile terminal 900 through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
- the input unit 930 may be used to receive input numerical or character information, and generate keyboard, mouse, joystick, optical or trackball signal input related to user settings and function control.
- the input unit 930 may include a touch-sensitive surface 931 as well as other input devices 932 .
- a touch-sensitive surface 931 also known as a touch display (touch screen) or a trackpad, collects the user's touch operations on or near it (such as the user's finger, stylus, etc., any suitable object or attachment on the touch-sensitive surface 931 operation on or near the touch-sensitive surface 931), and actuate the corresponding connection device according to a preset program.
- the touch-sensitive surface 931 may include two parts, a touch detection device and a touch controller.
- the touch detection device detects the user's touch orientation, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it to the touch controller.
- the touch-sensitive surface 931 may be implemented using resistive, capacitive, infrared, and surface acoustic wave types.
- the input unit 930 may also include other input devices 932 .
- other input devices 932 may include, but are not limited to, one or more of physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, joysticks, and the like.
- the display unit 940 may be used to display information input by or provided to the user and various graphical user interfaces of the mobile terminal 900, which may be composed of graphics, text, icons, videos, and any combination thereof.
- the display unit 940 may include a display panel 941, and optionally, an LCD (Liquid Crystal Display, liquid crystal display), OLED (Organic
- the display panel 941 is configured in the form of Light-Emitting Diode, organic light-emitting diode) or the like.
- the touch-sensitive surface 931 may cover the display panel 941, and when the touch-sensitive surface 931 detects a touch operation on or near it, it transmits it to the processor 980 to determine the type of the touch event, and then the processor 980 determines the type of the touch event according to the touch event.
- Type provides corresponding visual output on display panel 941 .
- the touch-sensitive surface 931 and the display panel 941 are used as two separate components to realize the input and output functions, it is understood that the touch-sensitive surface 931 and the display panel 941 are integrated to realize the input and output functions.
- the mobile terminal 900 may also include at least one sensor 950, such as a light sensor, a motion sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 941 according to the brightness of the ambient light, and the proximity sensor may generate an interruption when the flip is closed or closed.
- the gravitational acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes), and can detect the magnitude and direction of gravity when it is stationary. games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. that can also be configured on the mobile terminal 900, here No longer.
- the audio circuit 960 , the speaker 961 , and the microphone 962 may provide an audio interface between the user and the mobile terminal 900 .
- the audio circuit 960 can convert the received audio data into an electrical signal, and transmit it to the speaker 961, and the speaker 961 converts it into a sound signal for output; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal, which is converted by the audio circuit 960 After receiving, it is converted into audio data, and then the audio data is output to the processor 980 for processing, and then sent to, for example, another terminal through the RF circuit 910, or the audio data is output to the memory 920 for further processing.
- the audio circuit 960 may also include an earplug jack to provide communication between a peripheral headset and the mobile terminal 900 .
- the mobile terminal 900 can help the user to receive requests, send information, etc. through the transmission module 970 (eg, a Wi-Fi module), which provides the user with wireless broadband Internet access.
- the transmission module 970 eg, a Wi-Fi module
- the transmission module 970 it can be understood that it is not an essential component of the mobile terminal 900, and can be completely omitted as required within the scope of not changing the essence of the invention.
- the processor 980 is the control center of the mobile terminal 900, uses various interfaces and lines to connect various parts of the entire mobile phone, runs or executes the software programs and/or modules stored in the memory 920, and calls the data stored in the memory 920. , perform various functions of the mobile terminal 900 and process data, so as to perform overall monitoring of the mobile terminal.
- the processor 980 may include one or more processing cores; in some embodiments, the processor 980 may integrate an application processor and a modem processor, wherein the application processor mainly handles the operating system, user interface and Applications, etc., the modem processor mainly deals with wireless communication. It can be understood that the above-mentioned modulation and demodulation processor may not be integrated into the processor 980 .
- the mobile terminal 900 also includes a power source 990 (such as a battery) for powering various components.
- the power source can be logically connected to the processor 980 through a power management system, so as to manage charging, discharging, and power consumption through the power management system. management and other functions.
- Power supply 990 may also include one or more DC or AC power sources, recharging systems, power failure detection circuits, power converters or inverters, power status indicators, and any other components.
- the mobile terminal 900 further includes a camera (eg, a front camera, a rear camera), a Bluetooth module, and the like, which will not be repeated here.
- the display unit of the mobile terminal is a touch screen display
- the mobile terminal further includes a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be displayed by one or more programs.
- the above processor executing one or more programs contains instructions for:
- the above modules can be implemented as independent entities, or can be arbitrarily combined to be implemented as the same or several entities.
- the specific implementation of the above modules can refer to the previous method embodiments, which will not be repeated here.
- the embodiments of the present invention provide a storage medium, in which a plurality of instructions are stored, and the instructions can be loaded by a processor to execute the steps of any one of the data reading methods provided by the embodiments of the present invention.
- the storage medium may include: a read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD, etc.
- ROM Read Only Memory
- RAM Random Access Memory
- CD Compact Disc
- any data reading method provided by the embodiment of the present invention can be implemented.
- any data reading method provided by the embodiment of the present invention can be implemented.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Medical Informatics (AREA)
- Data Mining & Analysis (AREA)
- Telephone Function (AREA)
Abstract
Disclosed are a data reading method, a storage medium, and a mobile terminal. The method is applied to the mobile terminal. The method comprises: acquiring private data from a preset application program; backing up the private data to a device encryption storage area of the mobile terminal that is in a boot mode; and when the preset application program is run, if the mobile terminal is in the boot mode, reading the private data from the device encryption storage area. As such, the problem whereby an application cannot be used or the use of same is abnormal, defective, etc. in a direct boot mode is solved.
Description
本申请要求于2020年07月31日提交中国专利局、申请号为202010760386.1、发明名称为“数据读取方法、装置、存储介质及移动终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202010760386.1 and the title of the invention "Data reading method, device, storage medium and mobile terminal" filed with the China Patent Office on July 31, 2020, the entire contents of which are by reference Incorporated in this application.
本申请涉及通信技术领域,尤其涉及一种数据读取方法、存储介质及移动终端。The present application relates to the field of communication technologies, and in particular, to a data reading method, a storage medium and a mobile terminal.
启动模式(Direct Boot Mode)是Andriod
N中新引入的特性,指的是终端设备启动后直到用户解锁(unlock)前这个阶段,终端设备所进入的一个新模式。在该新模式下,终端设备只允许部分基础应用程序运行,比如闹钟、短信、电话等应用程序;而其他大部分应用程序,不允许被运行;这是考虑到用户隐私的问题。因为要保护用户隐私,在启动模式下,会导致一些基础应用程序无法获取所需的相关数据,如相关的隐私数据等,而导致对应的应用程序无法使用或者使用出现异常、缺陷等情况。例如,紧急联系人应用程序,作为紧急功能,是允许在未解锁状态下,即启动模式下运行的。但其所依赖的联系人数据库包含了大量个人的隐私数据,在未解锁状态下,不允许被暴露,导致启动模式下紧急联系人应用程序对应的紧急呼叫功能失效。The boot mode (Direct Boot Mode) is Andriod
The newly introduced feature in N refers to a new mode that the terminal device enters at the stage after the terminal device is started until the user unlocks it. In this new mode, the terminal device only allows some basic applications to run, such as alarm clock, SMS, phone and other applications; while most other applications are not allowed to run; this is a user privacy issue. Because of the need to protect user privacy, in the startup mode, some basic applications will not be able to obtain the required relevant data, such as related privacy data, etc., resulting in the corresponding application being unavailable or abnormal or defective in use. For example, the Emergency Contacts application, as an emergency function, is allowed to run in an unlocked state, i.e. in boot mode. However, the contact database it relies on contains a large amount of personal private data, which is not allowed to be exposed in the unlocked state, resulting in the failure of the emergency call function corresponding to the emergency contact application in the startup mode.
本申请实施例提供一种数据读取方法、存储介质及移动终端,能解决在启动模式下应用程序无法使用或者使用出现异常、缺陷等问题。The embodiments of the present application provide a data reading method, a storage medium, and a mobile terminal, which can solve the problems that the application program cannot be used in the startup mode, or that the use is abnormal or defective.
本申请实施例提供了一种数据读取方法,包括:The embodiment of the present application provides a data reading method, including:
获取预设应用程序的隐私数据;Obtain private data of preset applications;
将隐私数据备份至移动终端的启动模式下的设备加密存储区;Back up private data to the device encrypted storage area in the startup mode of the mobile terminal;
在运行预设应用程序时,若移动终端处于所述启动模式,则从设备加密存储区读取隐私数据。When running the preset application, if the mobile terminal is in the startup mode, the private data is read from the encrypted storage area of the device.
其中,所述数据读取方法,还包括:若所述移动终端处于正常模式,则从所述正常模式下的凭证加密存储区读取所述隐私数据。Wherein, the data reading method further includes: if the mobile terminal is in a normal mode, reading the privacy data from a credential encryption storage area in the normal mode.
其中,所述数据读取方法,还包括:Wherein, the data reading method further includes:
若所述移动终端处于启动模式,监听模式切换的广播消息,所述模式切换为从所述启动模式切换至所述移动终端的正常模式;If the mobile terminal is in the startup mode, monitor a broadcast message of mode switching, and the mode is switched from the startup mode to the normal mode of the mobile terminal;
若监听到模式切换的广播消息,从所述正常模式下的凭证加密存储区读取所述隐私数据。If the broadcast message of mode switching is monitored, the privacy data is read from the credential encryption storage area in the normal mode.
其中,所述获取预设应用程序的隐私数据,包括:Wherein, the obtaining the privacy data of the preset application includes:
获取预设应用程序在所述移动终端的启动模式下需使用的隐私数据。Obtain private data to be used by the preset application in the startup mode of the mobile terminal.
其中,获取预设应用程序在所述移动终端的启动模式下需使用的隐私数据,包括:Wherein, acquiring the privacy data to be used by the preset application in the startup mode of the mobile terminal includes:
从所述移动终端的正常模式下的凭证加密存储区,获取预设应用程序在所述移动终端的启动模式下需使用的隐私数据,或者Obtain private data to be used by a preset application in the startup mode of the mobile terminal from the credential encryption storage area in the normal mode of the mobile terminal, or
若接收到预设应用程序的数据增加指令,根据所述数据增加指令获取预设应用程序待新增的在所述移动终端的启动模式下需使用的隐私数据。If a data addition instruction of the preset application program is received, the privacy data to be added by the preset application program to be used in the startup mode of the mobile terminal is acquired according to the data addition instruction.
其中,所述获取预设应用程序的隐私数据,包括:获取所述隐私数据和所述隐私数据对应的隐私数据标识;Wherein, the obtaining the privacy data of the preset application includes: obtaining the privacy data and the privacy data identifier corresponding to the privacy data;
所述将所述隐私数据备份至所述移动终端的启动模式下的设备加密存储区,包括:将所述隐私数据和所述隐私数据标识备份至所述移动终端的启动模式下的设备加密存储区。The backing up the privacy data to the device encryption storage area in the startup mode of the mobile terminal includes: backing up the privacy data and the privacy data identifier to the device encryption storage area in the startup mode of the mobile terminal Area.
其中,在所述将所述隐私数据和所述隐私数据标识备份至所述移动终端的启动模式下的设备加密存储区之后,还包括:Wherein, after backing up the privacy data and the privacy data identifier to the device encryption storage area in the startup mode of the mobile terminal, the method further includes:
若接收到所述移动终端的正常模式下的凭证加密存储区的数据操作指令,根据所述数据操作指令确定操作类型、待操作数据和所述待操作数据对应的数据标识;If receiving the data operation instruction of the credential encryption storage area in the normal mode of the mobile terminal, determine the operation type, the data to be operated and the data identifier corresponding to the data to be operated according to the data operation instruction;
检测所述数据标识是否包括隐私数据标识;Detecting whether the data identifier includes a privacy data identifier;
若包括隐私数据标识,根据所述隐私数据标识获取所述设备加密存储区中对应的隐私数据;If the privacy data identifier is included, obtain the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier;
根据所述操作类型和所述待操作数据,对所述隐私数据进行操作。The private data is operated according to the operation type and the data to be operated.
其中,所述数据操作指令为数据新增指令,所述操作类型为新增,所述待操作数据包括待新增数据,所述待操作数据对应的数据标识包括待新增数据的数据标识;Wherein, the data operation instruction is a data addition instruction, the operation type is new addition, the data to be operated includes the data to be added, and the data identifier corresponding to the data to be operated includes the data identifier of the data to be added;
检测所述数据标识是否包括隐私数据标识,包括:获取所述待新增数据的数据标识,根据所述数据标识确定所述数据标识包括隐私数据标识,并将所述数据标识作为隐私数据标识;Detecting whether the data identifier includes a privacy data identifier includes: acquiring the data identifier of the data to be added, determining that the data identifier includes a privacy data identifier according to the data identifier, and using the data identifier as a privacy data identifier;
所述根据所述隐私数据标识获取所述设备加密存储区中对应的隐私数据,包括:根据所述隐私数据标识,获取预设应用程序在移动终端的启动模式下需使用的隐私数据,并将启动模式下需使用的隐私数据作为设备加密存储区中对应的隐私数据;The obtaining the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier includes: obtaining, according to the privacy data identifier, the privacy data to be used by a preset application in the startup mode of the mobile terminal, and storing the data. The private data to be used in the startup mode is used as the corresponding private data in the encrypted storage area of the device;
根据所述操作类型和所述待操作数据,对所述隐私数据进行操作,包括:将所述隐私数据标识和所述隐私数据备份至启动模式下的设备加密存储区。The operation on the private data according to the operation type and the data to be operated includes: backing up the private data identifier and the private data to an encrypted storage area of the device in the startup mode.
其中,所述数据操作指令为数据更新指令,所述操作类型为更新,所述待操作数据包括待更新数据,所述待操作数据对应的数据标识包括待更新数据的数据标识;Wherein, the data operation instruction is a data update instruction, the operation type is update, the to-be-operated data includes the to-be-updated data, and the data identifier corresponding to the to-be-operated data includes the data identifier of the to-be-updated data;
检测所述数据标识是否包括隐私数据标识,包括:获取待更新数据的数据标识,根据所获取的数据标识确定隐私数据标识;Detecting whether the data identifier includes a privacy data identifier includes: acquiring the data identifier of the data to be updated, and determining the privacy data identifier according to the acquired data identifier;
根据所述操作类型和所述待操作数据,对所述隐私数据进行操作,包括:根据待更新数据,更新启动模式下的设备加密存储区中对应的隐私数据。Operating the private data according to the operation type and the data to be operated includes: updating the corresponding private data in the encrypted storage area of the device in the startup mode according to the data to be updated.
其中,所述数据操作指令为数据删除指令,所述操作类型为删除,所述待操作数据包括待删除数据,所述待操作数据对应的数据标识包括待删除数据的数据标识;Wherein, the data operation instruction is a data deletion instruction, the operation type is deletion, the to-be-operated data includes the to-be-deleted data, and the data identifier corresponding to the to-be-operated data includes the data identifier of the to-be-deleted data;
检测所述数据标识是否包括隐私数据标识,包括:获取待删除数据的数据标识,根据所获取的数据标识确定隐私数据标识;Detecting whether the data identifier includes a privacy data identifier includes: acquiring the data identifier of the data to be deleted, and determining the privacy data identifier according to the acquired data identifier;
根据所述操作类型和所述待操作数据,对所述隐私数据进行操作,包括:根据待删除数据,删除启动模式下的设备加密存储区中对应的隐私数据。Operating the private data according to the operation type and the data to be operated includes: deleting the corresponding private data in the encrypted storage area of the device in the startup mode according to the data to be deleted.
本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有多条指令,所述指令适于由处理器加载以执行上述任一项数据读取方法。Embodiments of the present application further provide a computer-readable storage medium, where a plurality of instructions are stored in the computer-readable storage medium, and the instructions are suitable for being loaded by a processor to execute any one of the above data reading methods.
本申请实施例还提供了一种移动终端,包括处理器和存储器,所述处理器与所述存储器电性连接,所述存储器用于存储指令和数据,所述处理器用于运行所述指令并调用所述数据,以执行上述任一项所述的数据读取方法中的步骤。An embodiment of the present application further provides a mobile terminal, including a processor and a memory, the processor is electrically connected to the memory, the memory is used for storing instructions and data, the processor is used for running the instructions and The data is called to perform the steps in the data reading method described in any one of the above.
本申请提供的数据读取方法、存储介质及移动终端,获取预设应用程序的隐私数据;将隐私数据备份至移动终端的启动模式下的设备加密存储区;在运行预设应用程序时,若移动终端处于启动模式,则从设备加密存储区读取隐私数据。可以理解地,将预设应用程序的隐私数据提取出来,备份到启动模式下的设备加密存储区的存储空间,以在直接启动模式下可以读取隐私数据,如此,使得预设应用程序可以在直接启动模式下正常运行,解决在直接启动模式下应用无法使用或者使用出现异常、缺陷等问题,提高用户的体验。The data reading method, storage medium and mobile terminal provided by this application can obtain the privacy data of the preset application program; back up the privacy data to the device encrypted storage area in the startup mode of the mobile terminal; when running the preset application program, if When the mobile terminal is in the startup mode, the private data is read from the encrypted storage area of the device. It is understandable that the private data of the preset application is extracted and backed up to the storage space of the encrypted storage area of the device in the startup mode, so that the private data can be read in the direct startup mode. It runs normally in the direct boot mode, and solves the problems that the application cannot be used or the use is abnormal or defective in the direct boot mode, and improves the user experience.
下面结合附图,通过对本申请的具体实施方式详细描述,将使本申请的技术方案及其它有益效果显而易见。The technical solutions and other beneficial effects of the present application will be apparent through the detailed description of the specific embodiments of the present application in conjunction with the accompanying drawings.
图1a为本申请实施例提供的数据读取方法的流程示意图。FIG. 1a is a schematic flowchart of a data reading method provided by an embodiment of the present application.
图1b为本申请实施例提供的预设应用程序读取隐私数据的第一示例图。FIG. 1b is a first example diagram of reading private data by a preset application provided by an embodiment of the present application.
图1c为本申请实施例提供的预设应用程序读取隐私数据的第二示例图。FIG. 1c is a second example diagram of reading private data by a preset application provided by an embodiment of the present application.
图2为本申请实施例提供的数据读取方法的另一流程示意图。FIG. 2 is another schematic flowchart of a data reading method provided by an embodiment of the present application.
图3为本申请实施例提供的数据读取方法的另一流程示意图。FIG. 3 is another schematic flowchart of a data reading method provided by an embodiment of the present application.
图4a为本申请实施例提供的预设应用程序新增隐私数据的流程示意图。FIG. 4a is a schematic flowchart of adding privacy data to a preset application according to an embodiment of the present application.
图4b为本申请实施例提供的预设应用程序更新隐私数据的流程示意图。FIG. 4b is a schematic flowchart of updating privacy data by a preset application according to an embodiment of the present application.
图5a为本申请实施例提供的紧急联系人应用程序新增紧急联系人的流程示意图。FIG. 5a is a schematic flowchart of adding an emergency contact to an emergency contact application provided by an embodiment of the present application.
图5b为本申请实施例提供的紧急联系人应用程序更新紧急联系人的流程示意图。FIG. 5b is a schematic flowchart of an emergency contact application update emergency contact provided by an embodiment of the present application.
图6a为本申请实施例提供的电话应用程序新增联系人信息的流程示意图。FIG. 6a is a schematic flowchart of adding contact information to a phone application according to an embodiment of the present application.
图6b为本申请实施例提供的电话应用程序更新联系人信息的流程示意图。FIG. 6b is a schematic flowchart of updating contact information by a phone application according to an embodiment of the present application.
图6c为本申请实施例提供的电话应用程序查询联系人信息的流程示意图。FIG. 6c is a schematic flowchart of a phone application querying contact information according to an embodiment of the present application.
图7为本申请实施例提供的数据读取装置的结构示意图。FIG. 7 is a schematic structural diagram of a data reading apparatus provided by an embodiment of the present application.
图8为本申请实施例提供的移动终端的结构示意图。FIG. 8 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
图9为本申请实施例提供的移动终端的另一结构示意图。FIG. 9 is another schematic structural diagram of a mobile terminal according to an embodiment of the present application.
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those skilled in the art without creative work fall within the protection scope of the present application.
本申请实施例提供一种数据读取方法、装置、存储介质及移动终端。本申请实施例提供的任一种数据读取装置,可以集成在移动终端中,该移动终端可以包括智能手机、Pad、穿戴式设备、机器人等终端设备。移动终端中包括预设应用程序,该预设应用程序可以在移动终端的启动模式(Direct Boot Mode)下运行。优选的,该移动终端为安装有安卓系统的移动终端。Embodiments of the present application provide a data reading method, device, storage medium, and mobile terminal. Any of the data reading apparatuses provided in the embodiments of the present application may be integrated in a mobile terminal, and the mobile terminal may include terminal devices such as a smart phone, a Pad, a wearable device, and a robot. The mobile terminal includes a preset application program, and the preset application program can run in a startup mode (Direct Boot Mode) of the mobile terminal. Preferably, the mobile terminal is a mobile terminal installed with an Android system.
以下将以分别描述对应的数据读取方法、装置、存储介质以及移动终端。The corresponding data reading method, device, storage medium and mobile terminal will be described below respectively.
图1a是本申请实施例提供的数据读取方法的流程示意图,其应用于移动终端中,该数据读取方法包括步骤101~105,具体可以如下:1a is a schematic flowchart of a data reading method provided by an embodiment of the present application, which is applied to a mobile terminal, and the data reading method includes steps 101 to 105, which may be specifically as follows:
101,获取预设应用程序的隐私数据。101. Obtain private data of a preset application.
预设应用程序指的是在移动终端的启动模式下可以运行的应用程序,如移动终端中的一些基础应用程序,包括闹钟、紧急联系人、短信、电话等应用程序。隐私数据包括移动终端上存储的联系人信息、通讯好友信息、与通讯好友进行通讯的通信信息等与移动终端用户相关的私人数据。Preset applications refer to applications that can be run in the startup mode of the mobile terminal, such as some basic applications in the mobile terminal, including applications such as alarm clocks, emergency contacts, text messages, and phone calls. The private data includes the personal data related to the mobile terminal user, such as contact information, communication friend information, and communication information communicated with the communication friend stored on the mobile terminal.
以预设应用程序为紧急联系人应用程序为例,紧急联系人应用程序将联系人数据库(移动终端中用于存储联系人信息的数据库,俗称电话薄)中某一或者多个联系人添加为紧急联系人,并在锁屏情况下,提供相关的入口,让移动终端用户可快速呼叫紧急联系人。如此,隐私数据包括紧急情况下可联系的紧急联系人信息,该紧急联系人信息与联系人数据库中对应的联系人信息一致,具体包括该联系人姓名、联系人电话号码、联系人邮箱、联系人单位、联系人图片、联系人二维码等其中的一个或者多个信息。Taking the preset application as the emergency contact application as an example, the emergency contact application adds one or more contacts in the contact database (the database used for storing contact information in the mobile terminal, commonly known as the phone book) as Emergency contacts, and provide relevant entrances when the screen is locked, so that mobile terminal users can quickly call emergency contacts. In this way, the privacy data includes emergency contact information that can be contacted in an emergency, the emergency contact information is consistent with the corresponding contact information in the contact database, and specifically includes the contact name, contact phone number, contact email, contact information One or more information such as person unit, contact picture, contact QR code, etc.
以预设应用程序为电话应用程序为例,电话应用程序对应的隐私数据包括联系人数据库中的联系人信息,每个联系人信息具体包括对应的联系人数据库中该联系人姓名、联系人电话号码、联系人邮箱、联系人单位、联系人图片、联系人二维码等其中的一个或者多个信息。电话应用程序对应的隐私数据还包括通话记录等信息。Taking the preset application as the phone application as an example, the privacy data corresponding to the phone application includes the contact information in the contact database, and each contact information specifically includes the name of the contact, the phone number of the contact in the corresponding contact database One or more of the information, such as number, contact email, contact unit, contact picture, contact QR code, etc. The privacy data corresponding to the phone application also includes information such as call records.
预设应用程序的隐私数据可通过多种方式获取。在描述如何获取预设应用程序的隐私数据之前,先描述移动终端的启动模式和正常模式,以及移动终端存储数据的区域。The private data of the preset application can be obtained in various ways. Before describing how to obtain the private data of the preset application, first describe the startup mode and normal mode of the mobile terminal, and the area where the mobile terminal stores data.
启动模式,Direct Boot Mode,也可叫直接启动模式,指移动终端启动后进入的一个新模式,直至移动终端用户解锁(unlock)移动终端此模式结束。Boot mode, Direct Boot Mode, also called direct boot mode, refers to a new mode entered after the mobile terminal is started, until the mobile terminal user unlocks the mobile terminal and the mode ends.
正常模式,也可叫非Direct Boot Mode,或者非直接启动模式,指移动终端用户解锁(unlock)移动终端后的阶段所对应的模式。The normal mode, also called the non-direct boot mode or the non-direct boot mode, refers to the mode corresponding to the stage after the mobile terminal user unlocks the mobile terminal.
为了支持启动模式,移动终端预先提供两个存储数据的区域:In order to support the startup mode, the mobile terminal provides two areas for storing data in advance:
1)凭证加密存储区,Credential encrypted storage,也可简称为CE存储区,移动终端默认存储数据的存储区域,也可理解为默认存储位置,仅在移动终端用户解锁移动终端后可用该存储区域的存储空间,即在正常模式下可使用该存储空间。如图1b所示,预设应用程序在正常模式下可以正常读写存储在凭证加密存储区(默认存储位置)中的数据。1) Credential encrypted storage, also referred to as CE storage area, the storage area where the mobile terminal stores data by default, and can also be understood as the default storage location, which can only be used after the mobile terminal user unlocks the mobile terminal. Storage space, which is available in normal mode. As shown in Figure 1b, the preset application can normally read and write data stored in the credential encrypted storage area (the default storage location) in normal mode.
2)设备加密存储区,Device encrypted storage,也可简称为DE存储区,主要对应的是在启动模式下使用的存储区域,但该存储区域的存储空间在启动模式下和正常模式下都可以使用。2) Device encrypted storage, also referred to as DE storage, mainly corresponds to the storage area used in startup mode, but the storage space of this storage area can be used in both startup mode and normal mode .
一般情况下,预设应用程序需要在启动模式下使用的数据,将其存储至设备加密存储区即可。但对于隐私数据,比如说联系人数据库中的联系人信息、通话记录、通讯好友信息、与通讯好友进行通讯的通信信息等,为了保护用户隐私,不适合在未解锁的情况下过多暴露,因此,预设应用程序的隐私数据被放置在默认存储数据的存储区域,即凭证加密存储区里。在启动模式下,无法读取凭证加密存储区的数据。如图1b所示,预设应用程序在启动模式下无法正常读写存储在凭证加密存储区(默认存储位置)中的数据。In general, the data that the default application needs to use in startup mode can be stored in the device's encrypted storage area. However, for private data, such as contact information in the contact database, call records, communication friend information, communication information with communication friends, etc., in order to protect user privacy, it is not suitable for excessive exposure without unlocking. Therefore, the private data of the preset application is placed in the storage area where the data is stored by default, that is, the credential encryption storage area. In boot mode, the data of the credential encrypted store cannot be read. As shown in Figure 1b, the default application cannot normally read and write data stored in the credential encrypted storage area (the default storage location) in boot mode.
因此,步骤101,包括:从移动终端的正常模式下的凭证加密存储区,获取预设应用程序的隐私数据;或者Therefore, step 101 includes: obtaining the privacy data of the preset application program from the credential encryption storage area in the normal mode of the mobile terminal; or
若接收到预设应用程序的数据增加指令,根据数据增加指令获取预设应用程序待新增的隐私数据。If the data addition instruction of the preset application program is received, the privacy data to be added by the preset application program is acquired according to the data addition instruction.
其中,从移动终端的正常模式下的凭证加密存储区,获取预设应用程序的隐私数据。例如,若预设应用程序为紧急联系人应用程序,从移动终端的正常模式下的凭证加密存储区,获取紧急联系人应用程序的隐私数据,即对应的紧急联系人信息;若预设应用程序为电话应用程序,从移动终端的正常模式下的凭证加密存储区,获取电话应用程序的隐私数据,即对应的所有联系人信息。Wherein, the privacy data of the preset application is obtained from the credential encryption storage area in the normal mode of the mobile terminal. For example, if the preset application is an emergency contact application, the private data of the emergency contact application, that is, the corresponding emergency contact information, is obtained from the credential encryption storage area in the normal mode of the mobile terminal; For the phone application, the private data of the phone application, that is, all the corresponding contact information, is obtained from the credential encryption storage area in the normal mode of the mobile terminal.
其中,若接收到预设应用程序的数据增加指令,数据增加指令中携带有预设应用程序待新增的隐私数据,根据数据增加指令获取预设应用程序待新增的隐私数据。例如,若预设应用程序为电话应用程序,电话应用程序的数据增加指令,携带有待新增的隐私数据,如待新增的联系人信息或者待新增的通话记录信息,该数据增加指令用于将携带的待新增的联系人信息存储至联系人数据库,或者将待新增的通话记录信息进行存储。如此若接收到电话应用程序的数据增加指令,根据数据增加指令获取电话应用程序待新增的联系人信息或者待新增的通话记录信息。其中,待新增联系人信息的数据增加指令可通过在联系人数据库对应的新增界面上的保存控件触发,即触发联系人数据库对应的新增界面上的保存控件,以触发数据增加指令。待新增通话记录信息的数据增加指令可在检测到有去电或者有来电时生成。Wherein, if the data addition instruction of the preset application program is received, the data addition instruction carries the privacy data to be added by the preset application program, and the privacy data to be added by the preset application program is obtained according to the data addition instruction. For example, if the default application is a phone application, the data addition instruction of the phone application carries the privacy data to be added, such as the contact information to be added or the call record information to be added, the data addition instruction is used It is used to store the carried contact information to be added in the contact database, or to store the call record information to be added. In this way, if a data addition instruction of the phone application program is received, the contact information to be added or the call record information to be added of the phone application program is acquired according to the data addition instruction. The data addition instruction of the contact information to be added can be triggered by the save control on the new interface corresponding to the contact database, that is, trigger the save control on the new interface corresponding to the contact database to trigger the data addition instruction. The data addition instruction of the call record information to be added may be generated when an outgoing call or an incoming call is detected.
在一些情况下,步骤101,包括:从移动终端的正常模式下的凭证加密存储区,获取预设应用程序的隐私数据和隐私数据对应的隐私数据标识;或者In some cases, step 101 includes: obtaining the privacy data of the preset application and the privacy data identifier corresponding to the privacy data from the credential encryption storage area in the normal mode of the mobile terminal; or
若接收到预设应用程序的数据增加指令,根据数据增加指令获取预设应用程序新增的隐私数据和隐私数据对应的隐私数据标识。If the data addition instruction of the preset application program is received, the privacy data newly added by the preset application program and the privacy data identifier corresponding to the privacy data are obtained according to the data addition instruction.
可以理解地,隐私数据包括对应的隐私数据标识,隐私数据标识可以唯一的标识该隐私数据。如若隐私数据为联系人信息,隐私数据标识对应的为每个联系人的标识信息。具体地,可将该联系人的外部统一资源标识符(URI)作为隐私数据标识,也可以将联系人数据库中存储该联系人信息对应的标识(存储编号等)作为隐私数据标识,还可以将联系人电话号码作为隐私数据标识等。Understandably, the privacy data includes a corresponding privacy data identifier, and the privacy data identifier can uniquely identify the privacy data. If the private data is contact information, the private data identifier corresponds to the identification information of each contact. Specifically, the external Uniform Resource Identifier (URI) of the contact can be used as the privacy data identifier, the identifier (storage number, etc.) corresponding to the contact information stored in the contact database can also be used as the privacy data identifier, or the Contact phone numbers as privacy data identifiers, etc.
获取隐私数据标识,以通过隐私数据标识快捷方便地查找隐私数据标识对应的隐私数据,提高用户体验。Obtain the private data identifier, so as to quickly and conveniently find the private data corresponding to the private data identifier through the private data identifier, and improve the user experience.
需要注意到是,本申请实施例中提到的紧急联系人应用程序和电话应用程序只是预设应用程序的例举,以为了方便理解本申请实施例中的内容,并不构成对预设应用程序的限定。It should be noted that the emergency contact application program and the phone application program mentioned in the embodiments of this application are only examples of preset application programs, so as to facilitate the understanding of the content in the embodiments of this application, they do not constitute a preset application program. Program limitations.
102,将隐私数据备份至移动终端的启动模式下的设备加密存储区。102. Back up the private data to the device encrypted storage area in the startup mode of the mobile terminal.
获取了预设应用程序的隐私数据后,将隐私数据备份至移动终端的启动模式下的设备加密存储区。可以理解地,由于移动终端的启动模式下的设备加密存储区中的数据既可以在启动模式下使用,也可以在正常模式下使用,因此,在一种情况下,所获取的预设应用程序的隐私数据,仅保存在启动模式下的设备加密存储区中,如此,减少所占用的移动终端的存储空间。对应的,获取隐私数据时,从设备加密存储区获取。After acquiring the private data of the preset application, back up the private data to the device encrypted storage area in the startup mode of the mobile terminal. Understandably, since the data in the device encrypted storage area in the startup mode of the mobile terminal can be used in both the startup mode and the normal mode, in one case, the acquired preset application The private data is only stored in the encrypted storage area of the device in the startup mode, thus reducing the occupied storage space of the mobile terminal. Correspondingly, when obtaining private data, it is obtained from the encrypted storage area of the device.
优选的,预设应用程序的隐私数据既保存在启动模式下的设备加密存储区,也保存在正常模式下的凭证加密存储区,如此方便其他应用程序使用正常模式下的凭证加密存储区中存储的隐私数据,提高实用性。可以理解地,在隐私数据存储至正常模式下的凭证加密存储区的基础上,获取对应的隐私数据,并备份至设备加密存储区,以单应用程序双数据存储的形式,来解决在启动模式下无法获取正常模式下的凭证加密存储区的隐私数据而造成的不良影响,提高用户体验。具体地,如图1c所示,预设应用程序的隐私数据既保存在正常模式下的凭证加密存储区,又保存在启动模式下的设备加密存储区。在正常模式下,优先使用存储在凭证加密存储区(默认存储位置)中的隐私数据。在启动模式下,使用存储在设备加密存储区中的隐私数据,以单应用程序双数据存储的形式进行存储。Preferably, the privacy data of the preset application is stored not only in the device encrypted storage area in the startup mode, but also in the credential encrypted storage area in the normal mode, so that it is convenient for other applications to use the credential encrypted storage area in the normal mode to store in the encrypted storage area. privacy data and improve usability. Understandably, on the basis of storing private data in the credential encrypted storage area in normal mode, the corresponding private data is obtained and backed up to the encrypted storage area of the device. The bad influence caused by the inability to obtain the private data in the credential encryption storage area in the normal mode in the normal mode improves the user experience. Specifically, as shown in FIG. 1c , the privacy data of the preset application is stored in both the credential encrypted storage area in the normal mode and the device encrypted storage area in the startup mode. In normal mode, preference is given to private data stored in the credential encrypted store (the default storage location). In boot mode, private data stored in the device's encrypted storage is used in the form of single-app dual data storage.
其中,可将隐私数据备份至移动终端的启动模式下的设备加密存储区,以键值对的方式存储。若隐私数据的数据量比较小,则可使用SharedPreference来进行存储,对应的,隐私数据会自动被存储至设备加密存储区。其中,SharedPreference,简称为SP,是安卓系统提供的一种存储方式,用来存储一些简单配置信息。具体地使用Map数据结构来存储数据,以键值对的方式存储,采用了XML格式将数据存储到移动终端中,对应的存储文件存放在/data/data/
<package name>/shared_prefs目录下。适合单进程、小批量的数据存储与访问。The private data can be backed up to the device encryption storage area in the startup mode of the mobile terminal, and stored in the form of key-value pairs. If the amount of private data is relatively small, SharedPreference can be used to store it. Correspondingly, the private data will be automatically stored in the encrypted storage area of the device. Among them, SharedPreference, referred to as SP, is a storage method provided by the Android system to store some simple configuration information. Specifically, the Map data structure is used to store data, which is stored in the form of key-value pairs, and the data is stored in the mobile terminal in XML format, and the corresponding storage file is stored in /data/data/
<package name>/shared_prefs directory. It is suitable for single process, small batch data storage and access.
在一些情况下,若步骤101中获取了隐私数据标识,对应地,步骤102,包括:将隐私数据和对应的隐私数据标识备份至移动终端的启动模式下的设备加密存储区。In some cases, if the privacy data identifier is obtained in step 101, correspondingly, step 102 includes: backing up the privacy data and the corresponding privacy data identifier to the device encryption storage area in the startup mode of the mobile terminal.
103,在运行预设应用程序时,检测移动终端是否处于启动模式。103. When running the preset application program, detect whether the mobile terminal is in the startup mode.
当移动终端运行预设应用程序时,检测移动终端是否处于启动模式。其中,可通过预设函数来检测移动终端是否处于启动模式,该预设函数为UserManager.
isUserUnlocked()。When the mobile terminal runs the preset application program, it is detected whether the mobile terminal is in the startup mode. Wherein, whether the mobile terminal is in the startup mode can be detected by a preset function, and the preset function is UserManager.
isUserUnlocked().
104,若移动终端处于正常模式,则从正常模式下的凭证加密存储区读取隐私数据。即若检测出移动终端处于正常模式,则从默认存储数据的存储区域,即凭证加密存储区读取隐私数据。104. If the mobile terminal is in the normal mode, read privacy data from the credential encryption storage area in the normal mode. That is, if it is detected that the mobile terminal is in the normal mode, the private data is read from the storage area where the data is stored by default, that is, the credential encryption storage area.
105,若移动终端处于启动模式,则从启动模式下的设备加密存储区读取隐私数据。即若检测出移动终端当前处于启动模式,可以理解地,移动终端处于启动后且未解锁的阶段,对应地,从设备加密存储区读取隐私数据。105. If the mobile terminal is in the startup mode, read the private data from the encrypted storage area of the device in the startup mode. That is, if it is detected that the mobile terminal is currently in the startup mode, it can be understood that the mobile terminal is in the stage after startup but not unlocked, and correspondingly, the private data is read from the encrypted storage area of the device.
需要注意的是,步骤103~105可理解为对应的是查询隐私数据相关的步骤。It should be noted that steps 103 to 105 may be understood as corresponding to the steps related to querying private data.
上述实施例通过将预设应用程序的隐私数据提取出来,备份到启动模式下的设备加密存储区的存储空间,以在直接启动模式下可以从设备加密存储区读取隐私数据。如此,使得预设应用程序在直接启动模式下可以正常运行,解决在直接启动模式下应用无法使用或者使用出现异常、缺陷等问题,提高用户的体验。In the above embodiment, the private data of the preset application is extracted and backed up to the storage space of the device encrypted storage area in the boot mode, so that the private data can be read from the device encrypted storage area in the direct boot mode. In this way, the preset application program can run normally in the direct startup mode, so as to solve the problems that the application cannot be used in the direct startup mode, or have abnormal usage or defects, and improve the user experience.
图2是本申请实施例提供的数据读取方法的另一流程示意图,其应用于移动终端中,该数据读取方法包括步骤201~206,具体可以如下:2 is another schematic flowchart of the data reading method provided by the embodiment of the present application, which is applied to a mobile terminal. The data reading method includes steps 201 to 206, which may be specifically as follows:
201,获取预设应用程序在移动终端的启动模式下需使用的隐私数据和隐私数据所对应的隐私数据标识。201: Obtain privacy data to be used by a preset application in the startup mode of the mobile terminal and a privacy data identifier corresponding to the privacy data.
以预设应用程序为紧急联系人应用程序为例,紧急联系人应用程序在移动终端的启动模式下需使用的隐私数据包括联系人电话号码,可以理解地,有了联系人电话号码就可以通过紧急联系人应用程序来拨打该电话号码,快速呼叫紧急联系人,实现紧急呼叫功能。紧急联系人应用程序在移动终端的启动模式下需使用的隐私数据还可以包括联系人姓名,以在呼叫紧急联系人时,同时显示联系人姓名,提升用户体验。对应的,紧急联系人应用程序的隐私数据标识指的是每个紧急联系人的标识信息。可以理解地,紧急联系人信息包括多个不同的信息,该多个不同信息不一定在启动模式下都需要使用,因此,仅获取紧急联系人应用程序在启动模式下需使用的隐私数据。Taking the default application as the emergency contact application as an example, the private data that the emergency contact application needs to use in the startup mode of the mobile terminal includes the contact phone number. Emergency contact application to dial the phone number, quickly call emergency contacts, and realize emergency calling function. The private data to be used by the emergency contact application in the startup mode of the mobile terminal may further include the contact name, so that when the emergency contact is called, the contact name is displayed at the same time, so as to improve the user experience. Correspondingly, the privacy data identifier of the emergency contact application refers to the identification information of each emergency contact. It can be understood that the emergency contact information includes multiple different pieces of information, and the multiple different pieces of information are not necessarily required to be used in the startup mode. Therefore, only private data to be used by the emergency contact application in the startup mode is obtained.
以预设应用程序为电话应用程序为例,电话应用程序在移动终端的启动模式下需使用的隐私数据包括联系人电话号码,可以理解地,有了联系人电话号码就可以实现与联系人进行电话通讯,实现对应的语音通信功能。电话应用程序在移动终端的启动模式下需使用的隐私数据还可以包括联系人姓名,以在与联系人进行电话通讯时,同时显示联系人姓名,及在通话记录中显示对应的联系人姓名和联系人电话号码,提升用户体验。对应的,电话应用程序的隐私数据标识指的是每个联系人的标识信息。同理,可以理解地,仅获取电话应用程序在启动模式下需使用的隐私数据。Taking the preset application as the phone application as an example, the privacy data that the phone application needs to use in the startup mode of the mobile terminal includes the contact phone number. Understandably, with the contact phone number, it is possible to communicate with the contact. Telephone communication, realize the corresponding voice communication function. The privacy data to be used by the phone application in the startup mode of the mobile terminal may also include the contact name, so that when the phone communicates with the contact, the contact name is displayed at the same time, and the corresponding contact name and the corresponding contact name are displayed in the call record. Contact phone number to improve user experience. Correspondingly, the privacy data identification of the phone application refers to identification information of each contact. Likewise, it is understandable that only the private data that the phone application needs to use in the startup mode is obtained.
可以理解地,步骤201中的预设应用程序在移动终端的启动模式下需使用的隐私数据,与步骤101中的预设应用程序的隐私数据相比,在启动模式下需使用的隐私数据所对应的集合小于或者等于预设应用程序的隐私数据所对应的集合。It can be understood that the privacy data to be used by the preset application in step 201 in the startup mode of the mobile terminal, compared with the privacy data of the preset application in step 101, the privacy data to be used in the startup mode is different. The corresponding set is less than or equal to the set corresponding to the privacy data of the preset application.
具体地,步骤201,包括:从移动终端的正常模式下的凭证加密存储区,获取预设应用程序在移动终端的启动模式下需使用的隐私数据;或者Specifically, step 201 includes: obtaining private data to be used by a preset application in the startup mode of the mobile terminal from the credential encryption storage area in the normal mode of the mobile terminal; or
若接收到预设应用程序的数据增加指令,根据数据增加指令获取预设应用程序待新增的在移动终端的启动模式下需使用的隐私数据。If the data addition instruction of the preset application program is received, according to the data addition instruction, the privacy data to be added by the preset application program and to be used in the startup mode of the mobile terminal is obtained.
具体地,请参看上文中对应的步骤描述,在此不再赘述。Specifically, please refer to the corresponding step description above, which is not repeated here.
202,将隐私数据和隐私数据标识备份至启动模式下的设备加密存储区。202 , back up the privacy data and the privacy data identifier to the device encrypted storage area in the startup mode.
对应的,将从移动终端的正常模式下的凭证加密存储区中获取的预设应用程序在移动终端的启动模式下需使用的隐私数据,备份至启动模式下的设备加密存储区。或者将预设应用程序待新增的在移动终端的启动模式下需使用的隐私数据,备份至启动模式下的设备加密存储区,在该种情况下,待新增的隐私数据,还需要保存至默认存储位置,即凭证加密存储区。Correspondingly, the private data that the preset application program needs to use in the startup mode of the mobile terminal obtained from the credential encryption storage area in the normal mode of the mobile terminal is backed up to the device encryption storage area in the startup mode. Or back up the privacy data to be used in the startup mode of the mobile terminal to be added to the preset application to the encrypted storage area of the device in the startup mode. In this case, the privacy data to be added needs to be saved. to the default storage location, which is the credential encrypted storage area.
由于步骤201中获取的预设应用程序在移动终端的启动模式下需使用的隐私数据的集合小于或者等于步骤101中的预设应用程序的隐私数据的集合,如此,将启动模式下需使用的隐私数据备份至设备加密存储区后,既可以在预设应用程序运行时,获取预设应用程序在启动模式下需使用的隐私数据,保证了预设应用程序的正常运行;同时又可以最大程度的保障用户数据的隐秘性,最大程度的减少隐私数据的暴露;而且减少不必要的存储空间的消耗,减少移动终端存储隐私数据的存储空间。另外,将隐私数据标识也进行备份,以根据隐私数据标识更方便快速的查询到对应的隐私数据,且方便将凭证加密存储区和设备加密存储区中的隐私数据标识对应的隐私数据进行同步,如同步更新等。Since the set of privacy data to be used by the preset application obtained in step 201 in the startup mode of the mobile terminal is less than or equal to the set of privacy data of the preset application in step 101, the set of privacy data to be used in the startup mode is After the private data is backed up to the encrypted storage area of the device, the private data that the preset application needs to use in the startup mode can be obtained when the preset application is running, which ensures the normal operation of the preset application; at the same time, it can maximize the It protects the privacy of user data and minimizes the exposure of private data; it also reduces the consumption of unnecessary storage space and reduces the storage space for mobile terminals to store private data. In addition, the privacy data identification is also backed up, so that the corresponding privacy data can be queried more conveniently and quickly according to the privacy data identification, and it is convenient to synchronize the privacy data corresponding to the privacy data identification in the encrypted storage area of the certificate and the encrypted storage area of the device. Such as synchronous update and so on.
203,在运行预设应用程序时,检测移动终端是否处于启动模式。203. When running the preset application program, detect whether the mobile terminal is in the startup mode.
204,若移动终端处于正常模式,则根据隐私数据标识从正常模式下的凭证加密存储区读取隐私数据。204. If the mobile terminal is in the normal mode, read the privacy data from the credential encryption storage area in the normal mode according to the privacy data identifier.
根据隐私数据标识可快速的从凭证加密存储区读取对应的隐私数据。Corresponding private data can be quickly read from the credential encrypted storage area according to the private data identifier.
205,若移动终端处于启动模式,则根据隐私数据标识从启动模式下的设备加密存储区读取隐私数据,并监听模式切换的广播消息,该模式切换为从启动模式切换至正常模式。205. If the mobile terminal is in the startup mode, read the privacy data from the device encryption storage area in the startup mode according to the privacy data identifier, and monitor the broadcast message of the mode switching, which is to switch from the startup mode to the normal mode.
根据隐私数据标识可快速的从设备加密存储区读取对应的隐私数据。Corresponding private data can be quickly read from the encrypted storage area of the device according to the private data identifier.
需要注意的是,若移动终端处于启动模式,则意味着移动终端处于启动后且未解锁之前的阶段。然而用户解锁是不定时的行为,当检测到用户解锁成功,即进入至正常模式。如此,在一些情形下,会涉及到两个模式进行模式切换时读取隐私数据的情况。由于启动模式是移动终端处于启动后且未解锁之前的阶段所对应的模式,因此模式切换只有一种情况,即移动终端解锁成功时,从移动终端的启动模式切换至正常模式。It should be noted that if the mobile terminal is in the startup mode, it means that the mobile terminal is in the stage after startup but before unlocking. However, the user unlocking is an irregular behavior. When it is detected that the user unlocking is successful, it will enter the normal mode. In this way, in some cases, it will involve the situation of reading private data when the two modes are switched between modes. Since the startup mode is the mode corresponding to the stage after the mobile terminal is started but not unlocked, there is only one case of mode switching, that is, when the mobile terminal is successfully unlocked, the startup mode of the mobile terminal is switched to the normal mode.
假设移动终端用户在启动模式下打开了预设应用程序,并且预设应用程序从设备加密存储区读取隐私数据。当移动终端用户解锁移动终端成功后,此时已进入正常模式,若未检测到模式切换,则移动终端仍读取的是启动模式下的隐私数据,可能会导致不好的用户体验。那么在模式切换的过程中,如何进行处理的呢?It is assumed that the user of the mobile terminal opens the preset application in the startup mode, and the preset application reads private data from the device encrypted storage area. After the mobile terminal user successfully unlocks the mobile terminal, the mobile terminal has entered the normal mode. If no mode switching is detected, the mobile terminal still reads the private data in the startup mode, which may lead to a bad user experience. So in the process of mode switching, how to deal with it?
监听模式切换的广播消息,该广播消息具体为"android.intent.action.USER_
UNLOCKED",该广播消息可以监听移动终端用户从移动终端的启动模式到正常模式的模式切换。The broadcast message of the monitoring mode switch, the broadcast message is "android.intent.action.USER_
UNLOCKED", this broadcast message can monitor the mode switching of the mobile terminal user from the startup mode of the mobile terminal to the normal mode.
206,若监听到模式切换的广播消息,根据隐私数据标识从正常模式下的凭证加密存储区重新读取隐私数据。206 , if the mode switching broadcast message is monitored, re-read the privacy data from the credential encryption storage area in the normal mode according to the privacy data identifier.
若监听到模式切换的广播消息后,根据隐私数据标识重新从凭证加密存储区读取隐私数据,完成隐私数据读取的切换,提升用户体验。若未监听到模式切换的广播消息,则继续监听。If the broadcast message of mode switching is monitored, the private data is read from the credential encryption storage area again according to the private data identifier to complete the switching of private data reading and improve the user experience. If the broadcast message of the mode switch is not monitored, the monitoring will continue.
该实施例中未描述的步骤请参看上文中的对应描述,在此不再赘述。该实施例进一步限定所获取的隐私数据是预设应用程序在启动模式下需使用的隐私数据;而且进一步限定了特殊情况的处理,即在涉及到两个模式进行模式切换时读取隐私数据的情况的处理。For steps not described in this embodiment, please refer to the corresponding description above, and details are not repeated here. This embodiment further defines that the acquired privacy data is the privacy data that the preset application program needs to use in the startup mode; and further defines the processing of special cases, that is, when two modes are involved in the mode switching, the privacy data is read. handling of the situation.
在一些情况下,还涉及到对正常模式下的凭证加密存储区的隐私数据的修改操作,此时,涉及到正常模式下的凭证加密存储区的隐私数据与启动模式下的设备加密存储区的隐私数据的同步。具体地,请参看图3,图3是本申请实施例提供的数据读取方法的另一流程示意图。该数据读取方法包括以下步骤:In some cases, it also involves modifying the private data of the credential encrypted storage area in the normal mode. At this time, it involves the private data of the credential encrypted storage area in the normal mode and the device encrypted storage area in the boot mode. Synchronization of private data. Specifically, please refer to FIG. 3 , which is another schematic flowchart of a data reading method provided by an embodiment of the present application. The data reading method includes the following steps:
301,若接收到移动终端的凭证加密存储区的数据操作指令,根据数据操作指令确定操作类型、待操作数据和待操作数据对应的数据标识。301. If a data operation instruction in the credential encryption storage area of the mobile terminal is received, determine the operation type, the data to be operated, and the data identifier corresponding to the data to be operated according to the data operation instruction.
可以理解地,数据操作指令中携带操作类型、待操作数据和待操作数据对应的数据标识等信息,根据数据操作指令确定操作类型、待操作数据和待操作数据对应的数据标识。其中,数据操作指令包括数据更新指令和数据删除指令等,进一步地,包括隐私数据更新指令和隐私数据删除指令等,对应的操作类型包括隐私数据更新和隐私数据删除等。待操作数据,对应的,包括待更新数据和待删除数据。如对于紧急联系人应用程序、电话应用程序来说,待操作数据,都涉及到联系人信息,即待操作数据包括联系人信息;对联系人信息进行操作,具体为在联系人数据库中对联系人信息进行操作;对应的,待操作数据对应的数据标识为待操作的联系人的标识信息。当然对于电话应用来说,对应的待操作数据还包括通话记录等。Understandably, the data operation instruction carries information such as the operation type, the data to be operated, and the data identifier corresponding to the data to be operated, and the operation type, the data to be operated, and the data identifier corresponding to the data to be operated are determined according to the data operation instruction. The data operation instructions include data update instructions and data deletion instructions, etc., and further include privacy data update instructions and privacy data deletion instructions, and the corresponding operation types include privacy data update and privacy data deletion. The data to be operated, correspondingly, includes the data to be updated and the data to be deleted. For example, for emergency contact applications and phone applications, the data to be operated involves contact information, that is, the data to be operated includes contact information; the operation of the contact information, specifically, the contact information in the contact database Person information to operate; correspondingly, the data identification corresponding to the data to be operated is the identification information of the contact to be operated. Of course, for a phone application, the corresponding data to be operated also includes call records and the like.
可以理解地,因为隐私数据可能是从正常模式下的凭证加密存储区备份至启动模式下的设备加密存储区的,且凭证加密存储区的隐私数据的集合大于或者等于设备加密存储区的的隐私数据的集合,因此,一般情况下,当对凭证加密存储区的隐私数据进行操作时,需要进行同步。Understandably, because the private data may be backed up from the credential encrypted storage area in the normal mode to the device encrypted storage area in the boot mode, and the set of private data in the credential encrypted storage area is greater than or equal to the privacy of the device encrypted storage area. A collection of data, so, in general, synchronization is required when operating on private data in a credential encrypted store.
302,检测数据标识是否包括隐私数据标识。302. Detect whether the data identifier includes a privacy data identifier.
由于待操作数据有可能并不涉及到保存至设备加密存储区中的隐私数据,因此需要检测待操作的数据标识是否包括隐私数据标识。如对于紧急联系人应用程序,当需要对凭证加密存储区的联系人数据库中的联系人信息进行操作时,待操作数据可能并不是紧急联系人应用程序中涉及的紧急联系人。Since the data to be operated may not involve the private data saved in the encrypted storage area of the device, it is necessary to detect whether the data identifier to be operated includes the private data identifier. For example, for the emergency contact application, when the contact information in the contact database in the credential encrypted storage area needs to be operated, the data to be operated may not be the emergency contact involved in the emergency contact application.
若数据标识不包括隐私数据标识,则直接按照现有技术对凭证加密存储区中的待操作数据进行与操作类型匹配的操作;若包括隐私数据标识,执行步骤303;此外,还需要按照现有技术对凭证加密存储区中的待操作数据进行与操作类型匹配操作。If the data identifier does not include the privacy data identifier, directly perform an operation matching the operation type on the data to be operated in the credential encryption storage area according to the prior art; if the privacy data identifier is included, go to step 303; The technology performs an operation matching the operation type on the data to be operated in the credential encrypted storage area.
303,根据隐私数据标识获取设备加密存储区中对应的隐私数据。303. Acquire corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier.
由于隐私数据标识与隐私数据有对应的关联关系,通过隐私数据标识可获取设备加密存储区中对应的隐私数据。Since the private data identifier has a corresponding association relationship with the private data, the corresponding private data in the encrypted storage area of the device can be obtained through the private data identifier.
304,根据操作类型和待操作数据,对设备加密存储区中的隐私数据进行操作。304. Perform operations on the private data in the encrypted storage area of the device according to the operation type and the data to be operated.
如操作类型是更新操作,根据待更新数据对设备加密存储区中的隐私数据进行更新;如操作类型是删除,则根据待删除数据对设备加密存储区中的隐私数据进行删除。If the operation type is an update operation, update the private data in the encrypted storage area of the device according to the data to be updated; if the operation type is delete, delete the private data in the encrypted storage area of the device according to the data to be deleted.
该实施例中进一步限定当需要对凭证加密存储区中的隐私数据进行更新和删除时,如何实现对设备加密存储区中的隐私数据的更新和删除,以实现设备加密存储区和凭证加密存储区的隐私数据的同步。This embodiment further defines how to update and delete the private data in the encrypted storage area of the device when the private data in the encrypted storage area of the credentials needs to be updated and deleted, so as to realize the encrypted storage area of the device and the encrypted storage area of the credentials. synchronization of private data.
以上实施例涉及到了预设应用程序的隐私数据在启动模式下的设备加密存储区中进行增加、更新和删除等的处理。为了更清楚的理解本申请实施例中的内容,下面将分别从新增、更新和删除处理时,对应的预设应用程序对凭证加密存储区的隐私数据处理的操作步骤(也可称为原来操作步骤或者原生操作步骤)和对设备加密存储区的隐私数据处理的操作步骤(可称为新增操作步骤)来进行说明。简单理解,就是在预设应用程序的原生操作步骤(如增删改查等)的基础上,添加了对应的新增操作步骤。需要说明的是,以下的原生操作步骤和新增操作步骤中的步骤只是简单的示例说明,还可以包括更多的详细步骤。The above embodiments relate to the processing of adding, updating and deleting the private data of the preset application in the device encrypted storage area in the startup mode. In order to understand the contents of the embodiments of the present application more clearly, the following will describe the operation steps for processing the privacy data in the credential encrypted storage area by the corresponding preset application program (also referred to as the original operation steps or native operation steps) and the operation steps for processing private data in the encrypted storage area of the device (may be referred to as new operation steps). A simple understanding is that the corresponding new operation steps are added on the basis of the original operation steps of the preset application (such as addition, deletion, modification, search, etc.). It should be noted that the steps in the following native operation steps and newly added operation steps are just simple examples, and may also include more detailed steps.
具体请参看图4a-图4b。图4a对应的是预设应用程序的新增隐私数据的处理流程示意图,图4b对应的是预设应用程序的更新隐私数据的处理流程示意图。Please refer to Fig. 4a-Fig. 4b for details. FIG. 4a corresponds to a schematic diagram of a processing flow of adding privacy data of a preset application, and FIG. 4b corresponds to a schematic diagram of a processing flow of updating privacy data of a preset application.
请参看图4a,预设应用程序的新增隐私数据的处理流程包括如下步骤:Referring to FIG. 4a, the processing flow of the newly added privacy data of the default application includes the following steps:
411,接收预设应用程序的数据新增指令,并获取待新增数据。411. Receive a data addition instruction of a preset application, and acquire the data to be added.
412,将待新增数据添加至正常模式下的凭证加密存储区。412. Add the data to be added to the credential encryption storage area in the normal mode.
例如,若新增联系人信息,则将待新增数据(待新增联系人信息)添加至正常模式下的凭证加密存储区中的联系人数据库。For example, if contact information is added, the data to be added (contact information to be added) is added to the contact database in the credential encryption storage area in the normal mode.
413,获取待新增数据的数据标识,作为隐私数据标识。413: Acquire a data identifier of the data to be added as a privacy data identifier.
414,根据待新增数据,获取预设应用程序在移动终端的启动模式下需使用的隐私数据。可将待新增数据的全部作为隐私数据,也可以将待新增数据的部分作为隐私数据。414 , according to the data to be added, obtain the privacy data to be used by the preset application in the startup mode of the mobile terminal. All the data to be added can be regarded as private data, or part of the data to be added can be regarded as private data.
415,将隐私数据标识和隐私数据备份至启动模式下的设备加密存储区。415. Back up the privacy data identifier and the privacy data to the device encrypted storage area in the startup mode.
其中,步骤411~412对应的是预设应用程序的原生操作步骤,步骤413~415对应的是新增操作步骤。Wherein, steps 411-412 correspond to the original operation steps of the default application, and steps 413-415 correspond to newly-added operation steps.
请参看图4b,预设应用程序的更新隐私数据的处理流程包括如下步骤:Referring to Fig. 4b, the processing flow of updating privacy data of the preset application includes the following steps:
421,接收预设应用程序的数据更新指令,并获取待更新数据。421. Receive a data update instruction of a preset application, and acquire data to be updated.
422,根据待更新数据,将正常模式下的凭证加密存储区对应的数据进行更新。422. Update data corresponding to the credential encryption storage area in the normal mode according to the data to be updated.
423,获取待更新数据的数据标识,根据所获取的数据标识确定隐私数据标识。如检测所获取的数据标识是否为隐私数据标识等。423: Acquire the data identifier of the data to be updated, and determine the privacy data identifier according to the acquired data identifier. For example, detecting whether the acquired data identifier is a private data identifier, etc.
424,通过隐私数据标识获取启动模式下的设备加密存储区中对应的隐私数据。424. Obtain corresponding private data in the encrypted storage area of the device in the startup mode by using the private data identifier.
425,根据待更新数据,更新设备加密存储区中对应的隐私数据。425. Update the corresponding private data in the encrypted storage area of the device according to the data to be updated.
其中,步骤421~422对应的是预设应用程序的原生操作步骤,步骤423~425对应的是新增操作步骤。其中,上述图4a-图4b的处理流程中的每个步骤的详细内容请参看上文中的对应步骤的描述,在此不再赘述。Wherein, steps 421 to 422 correspond to the original operation steps of the default application, and steps 423 to 425 correspond to newly added operation steps. For details of each step in the above-mentioned processing flow of FIG. 4a-FIG. 4b, please refer to the description of the corresponding step above, which will not be repeated here.
其中预设应用程序的处理流程还包括预设应用程序的删除隐私数据的处理流程。预设应用程序的删除隐私数据的处理流程与预设应用程序的更新隐私数据的处理流程一致。可以理解地,在预设应用程序的删除隐私数据的处理流程中,将上述预设应用程序的更新隐私数据的处理流程所对应步骤中的数据更新指令对应更改为数据删除指令,将待更新数据对应更改为待删除数据,将更新对应更改为删除等,为了简洁,在此不再赘述。The processing flow of the preset application program further includes the processing flow of deleting private data of the preset application program. The processing flow of deleting private data of the preset application is consistent with the processing flow of updating private data of the preset application. It can be understood that, in the processing flow of deleting privacy data of the preset application, the data update instruction in the corresponding step of the processing flow of updating the privacy data of the preset application is correspondingly changed to a data deletion instruction, and the data to be updated is changed accordingly. The corresponding change is to the data to be deleted, and the corresponding update is changed to delete, etc. For the sake of brevity, details are not repeated here.
为了进一步理解本申请实施例中的内容,下面将以紧急联系人应用程序为例进行说明。In order to further understand the content in the embodiments of the present application, the following will take an emergency contact application as an example for description.
对于紧急联系人应用程序,移动终端用户将联系人数据库中的一个或者多个联系人信息添加至该紧急联系人应用程序中,遇到突发情况可以快速查找并呼出电话。紧急联系人应用程序的原生实现逻辑是在设备加密存储区使用SharedPreference来存储联系人的标识信息,如联系人的URI;当运行紧急联系人应用程序时,通过URI去匹配和查询联系人数据库中的对应的联系人信息。然而由于在启动模式下无法查询联系人数据库,导致紧急联系人应用程序在启动模式下无法正常工作。For the emergency contact application, the mobile terminal user adds one or more contact information in the contact database to the emergency contact application, and can quickly find and make outgoing calls in case of emergencies. The native implementation logic of the emergency contact application is to use SharedPreference in the device encrypted storage area to store the identification information of the contact, such as the URI of the contact; when running the emergency contact application, the URI is used to match and query the contact database. the corresponding contact information. However, the Emergency Contacts application does not work properly in boot mode because the contacts database cannot be queried in boot mode.
本申请实施例至少可采用两种方案来解决紧急联系人应用程序在启动模式下无法正常工作的问题:1、将联系人数据库中对应的紧急联系人信息从凭证加密存储区备份至设备加密存储区,如此,使得紧急联系人应用程序在启动模式下可以从设备加密存储区获取紧急联系人信息;2、从凭证加密存储区获取紧急联系人应用程序在启动模式下需使用的隐私数据,如紧急联系人的联系人姓名和联系人电话号码等,将紧急联系人应用程序在启动模式下需使用的隐私数据备份至设备加密存储区,使得紧急联系人应用程序在启动模式下可以从设备加密存储区获取需使用的隐私数据。优选的,使用方案2,由于紧急联系人的数量不会很多,且在启动模式下需使用的隐私数据也不会很多,因此,在方案2中可使用SharedPreference来存储在启动模式下需使用的隐私数据。在此处将分别从新增、更新和删除紧急联系人信息时,对应的紧急联系人应用程序的原生操作步骤和新增操作步骤进行简单的介绍。The embodiment of the present application can adopt at least two solutions to solve the problem that the emergency contact application cannot work normally in the startup mode: 1. Back up the corresponding emergency contact information in the contact database from the credential encrypted storage area to the device encrypted storage area In this way, the emergency contact application can obtain the emergency contact information from the device encrypted storage area in the startup mode; 2. Obtain the private data that the emergency contact application needs to use in the startup mode from the credential encrypted storage area, such as The contact name and contact phone number of the emergency contact, etc., back up the private data that the emergency contact application needs to use in the startup mode to the device encryption storage area, so that the emergency contact application can be encrypted from the device in the startup mode. The storage area obtains the private data to be used. Preferably, using scheme 2, since the number of emergency contacts is not large, and the private data to be used in startup mode is not much, therefore, in scheme 2, SharedPreference can be used to store the data to be used in startup mode. Privacy Data. Here, the corresponding native operation steps and new operation steps of the emergency contact application will be briefly introduced when adding, updating, and deleting emergency contact information.
具体地,请参看图5a-图5b,图5a对应的是紧急联系人应用程序新增紧急联系人的处理流程示意图,图5b对应的是紧急联系人应用程序更新紧急联系人的处理流程示意图。Specifically, please refer to FIGS. 5a-5b. FIG. 5a corresponds to a schematic diagram of the processing flow of adding an emergency contact by the emergency contact application, and FIG. 5b corresponds to the processing flow diagram of the emergency contact application updating an emergency contact.
请参看图5a,紧急联系人应用程序新增紧急联系人的处理流程包括:Referring to Figure 5a, the processing flow of adding an emergency contact to the emergency contact application includes:
511,当接收到紧急联系人应用程序的数据新增指令时,根据数据新增指令调用联系人数据库,并通过联系人数据库查询以及确定紧急联系人信息。511 , when receiving the data addition instruction of the emergency contact application, call the contact database according to the data addition instruction, and query and determine emergency contact information through the contact database.
512,获取紧急联系人的标识信息,并将紧急联系人的标识信息保存至启动模式下的设备加密存储区。如将紧急联系人的标识信息使用SharedPreference保存至设备加密存储区,该标识信息可以是联系人的URI。512. Acquire the identification information of the emergency contact, and save the identification information of the emergency contact to the device encryption storage area in the startup mode. For example, if the identification information of the emergency contact is saved to the device encrypted storage area by using SharedPreference, the identification information may be the URI of the contact.
513,获取紧急联系人信息对应的在启动模式下需使用的隐私数据。513: Obtain private data to be used in the startup mode corresponding to the emergency contact information.
在启动模式下需使用的隐私数据包括联系人电话号码、联系人姓名等。The private data to be used in boot mode includes contact phone number, contact name, etc.
514,通过所获取的紧急联系人的标识信息,将所获取的在启动模式下需使用的隐私数据备份至设备加密存储区。具体地,由于已经在设备加密存储区保存了对应的紧急联系人的标识信息,因此需根据紧急联系人的标识信息查询对应的SharedPreference,可以理解地,查询紧急联系人的标识信息对应的键值对,再将隐私数据保存至设备加密存储区对应的SharedPreference。514. Back up the acquired private data to be used in the startup mode to the device encryption storage area by using the acquired identification information of the emergency contact. Specifically, since the identification information of the corresponding emergency contact has been saved in the encrypted storage area of the device, it is necessary to query the corresponding SharedPreference according to the identification information of the emergency contact. It is understandable to query the key value corresponding to the identification information of the emergency contact. Yes, and then save the private data to the SharedPreference corresponding to the encrypted storage area of the device.
其中,步骤511~512对应的是紧急联系人应用程序的原生操作步骤,步骤513~514对应的是新增操作步骤。Wherein, steps 511-512 correspond to the original operation steps of the emergency contact application, and steps 513-514 correspond to newly-added operation steps.
请参看图5b,紧急联系人应用程序更新紧急联系人的处理流程包括如下步骤:Referring to Figure 5b, the processing flow of the emergency contact application for updating emergency contacts includes the following steps:
521,当接收到紧急联系人应用程序的数据更新指令时,调用联系人数据库,并通过联系人数据库查询和确定待更新的紧急联系人信息,以及获取紧急联系人的标识信息。521 , when receiving the data update instruction of the emergency contact application, call the contact database, query and determine the emergency contact information to be updated through the contact database, and obtain the identification information of the emergency contact.
522,通过紧急联系人的标识信息查询并更新启动模式下的设备加密存储区中保存的标识信息。522 , query and update the identification information stored in the encrypted storage area of the device in the startup mode by using the identification information of the emergency contact.
具体地,更新设备加密存储区中对应的SharedPreference中保存的标识信息。该标识信息是原生操作步骤中保存的标识信息。Specifically, the identification information stored in the corresponding SharedPreference in the device encryption storage area is updated. The identification information is the identification information saved in the native operation step.
523,通过所获取的紧急联系人的标识信息更新在启动模式下保存至设备加密存储区的需使用的隐私数据。具体地,更新在启动模式下保存至设备加密存储区对应的SharedPreference中需使用的隐私数据,该隐私数据包括紧急联系人的联系人姓名、联系人电话号码等。523 , update the private data to be used saved in the device encryption storage area in the startup mode by using the acquired identification information of the emergency contact. Specifically, update the private data to be used in the SharedPreference stored in the device encryption storage area in the startup mode, where the private data includes the contact name, contact phone number and the like of the emergency contact.
其中,步骤521~522对应的是紧急联系人应用程序的原生操作步骤,步骤523对应的是新增操作步骤。Wherein, steps 521 to 522 correspond to the original operation steps of the emergency contact application, and step 523 corresponds to the newly added operation steps.
其中紧急联系人应用程序的处理流程还包括紧急联系人应用程序的删除紧急联系人的处理流程。紧急联系人应用程序的删除紧急联系人的处理流程与紧急联系人应用程序的更新紧急联系人的处理流程一致。可以理解地,在紧急联系人应用程序的删除紧急联系人的处理流程中,将上述紧急联系人应用程序的更新紧急联系人的处理流程所对应步骤中的数据更新指令对应更改为数据删除指令,将待更新对应更改为待删除,将更新对应更改为删除等,为了简洁,在此不再赘述。The processing flow of the emergency contact application further includes a processing flow of deleting the emergency contact in the emergency contact application. The process of deleting emergency contacts in the emergency contacts application is the same as the process of updating emergency contacts in the emergency contacts application. It can be understood that in the processing flow of the emergency contact application program for deleting emergency contacts, the data update instruction in the corresponding steps of the emergency contact application program's processing flow for updating emergency contacts is correspondingly changed to a data deletion instruction, Change the to-be-updated correspondence to to-be-deleted, and the update correspondence to be changed to delete, etc. For the sake of brevity, details are not repeated here.
紧急联系人查询紧急联系人信息的处理流程包括:当运行紧急联系人应用程序时,如显示紧急联系人列表时,检测移动终端是否处于启动模式;若移动终端处于启动模式,则从设备加密存储区中读取紧急联系人信息对应的隐私数据,如从设备加密存储区对应的SharedPreference中读取紧急联系人信息对应的隐私数据,该隐私数据包括紧急联系人的联系人姓名、联系人电话号码等;若移动终端处于正常模式,则从默认存储位置读取紧急联系人对应的隐私数据,具体地,在凭证加密存储区的联系人数据库中读取对应的隐私数据。如此,无论是在启动模式下还是在正常模式下,都能读取紧急联系人对应的隐私数据,使得在两种模式下,紧急联系人应用程序都可以正常运行。The processing flow of the emergency contact inquiring about the emergency contact information includes: when the emergency contact application is running, such as when the emergency contact list is displayed, detecting whether the mobile terminal is in the startup mode; if the mobile terminal is in the startup mode, encrypting storage from the device Read the private data corresponding to the emergency contact information in the area. For example, read the private data corresponding to the emergency contact information from the SharedPreference corresponding to the encrypted storage area of the device. The private data includes the contact name and contact phone number of the emergency contact. etc.; if the mobile terminal is in the normal mode, the private data corresponding to the emergency contact is read from the default storage location, specifically, the corresponding private data is read from the contact database in the credential encrypted storage area. In this way, the private data corresponding to the emergency contact can be read no matter in the startup mode or in the normal mode, so that the emergency contact application can run normally in both modes.
为了进一步理解本申请实施例中的内容,下面将以电话应用程序为例进行说明。In order to further understand the content in the embodiments of the present application, a phone application is used as an example for description below.
电话应用程序是移动终端的基本功能,它是紧急呼叫的基础,在启动模式下允许运行。但在启动模式下无法读取凭证加密存储区中的联系人数据库,因此,无法进行联系人的匹配操作,即在启动模式下通话界面只能显示电话号码,而不知道是再跟谁通话,造成电话应用程序在启动模式下存在使用缺陷。The phone application is the basic function of the mobile terminal, it is the basis for emergency calls, and it is allowed to operate in the activated mode. However, in the startup mode, the contact database in the encrypted storage area of the credentials cannot be read. Therefore, the contact matching operation cannot be performed. That is, in the startup mode, the call interface can only display the phone number, and it is not known who to call again. Causes the phone application to have a usage bug in boot mode.
本申请实施例至少可采用两种方案来解决电话应用程序在启动模式下存在使用缺陷的问题:1、将联系人数据库中的所有联系人信息/新增的联系人信息备份至启动模式下的设备加密存储区,如此,使得电话应用程序在启动模式下可以从设备加密存储区获取每个联系人信息;2、获取电话应用程序在启动模式下需使用的隐私数据,如联系人姓名和联系人电话号码等,将电话应用程序在启动模式下需使用的隐私数据备份至设备加密存储区,使得电话应用程序在启动模式下进行通话时,可以显示联系人姓名和联系人电话号码等信息。优选的,使用方案2。具体地,使用SharedPreference来存储电话应用程序在启动模式下需使用的隐私数据。在此处将分别对新增、更新和删除联系人信息时,对应的电话应用程序的原生操作步骤和新增操作步骤进行简单的介绍。The embodiments of the present application can adopt at least two solutions to solve the problem that the phone application has usage defects in the startup mode: 1. Back up all the contact information/added contact information in the contact database to the phone application in the startup mode. The device encrypted storage area, so that the phone application can obtain each contact information from the device encrypted storage area in startup mode; 2. Obtain the private data that the phone application needs to use in startup mode, such as contact name and contact Backup the private data that the phone application needs to use in the startup mode to the device encrypted storage area, so that the phone application can display the contact name and contact phone number and other information when making a call in the startup mode. Preferably, scheme 2 is used. Specifically, SharedPreference is used to store private data that the phone application needs to use in startup mode. Here, the corresponding native operation steps and new operation steps of the phone application when adding, updating and deleting contact information will be briefly introduced.
其中,请参看图6a-图6c,图6a对应的是电话应用程序新增联系人信息的处理流程示意图,图6b对应的是电话应用程序更新联系人信息的处理流程示意图,图6c对应的是电话应用程序查询联系人信息的处理流程示意图。6a-6c, FIG. 6a corresponds to a schematic diagram of the processing flow of adding contact information by the phone application, FIG. 6b corresponds to the processing flow diagram of the phone application to update contact information, and FIG. 6c corresponds to A schematic diagram of the processing flow of the phone application querying contact information.
请参看图6a,电话应用程序新增联系人信息的处理流程包括如下步骤:Referring to Fig. 6a, the processing flow of adding contact information by the phone application includes the following steps:
611,当接收到电话应用程序的联系人信息的数据新增指令时,获取待新增的联系人信息。根据数据新增指令获取待新增的联系人信息。611. Acquire the contact information to be added when a data addition instruction of the contact information of the phone application is received. Obtain the contact information to be added according to the data addition instruction.
612,将获取的待新增的联系人信息存储至凭证加密存储区的联系人数据库。612. Store the acquired contact information to be added in the contact database of the credential encryption storage area.
613,获取待新增的联系人信息对应的标识信息和该联系人信息对应的在启动模式下需使用的隐私数据。其中,启动模式下需使用的隐私数据包括联系人姓名、联系人电话号码等。613: Acquire identification information corresponding to the contact information to be added and privacy data corresponding to the contact information to be used in the startup mode. The privacy data to be used in the startup mode includes a contact name, a contact phone number, and the like.
614,根据标识信息检测该需使用的隐私数据是否已存储在设备加密存储区。若否,则执行步骤615;若是,则执行步骤616。614. Detect, according to the identification information, whether the private data to be used has been stored in the device encrypted storage area. If no, go to step 615; if yes, go to step 616.
615,将标识信息和需使用的隐私数据保存至启动模式下的设备加密存储区。如使用SharedPreference保存至启动模式下的设备加密存储区。615. Save the identification information and the private data to be used to the device encrypted storage area in the startup mode. Such as using SharedPreference to save to the device encrypted storage area in boot mode.
616,根据标识信息,更新启动模式下的设备加密存储区联系人信息对应的隐私数据。具体地,更新启动模式下的设备加密存储区对应SharedPreference中联系人信息对应的隐私数据。616. Update the privacy data corresponding to the contact information in the encrypted storage area of the device in the startup mode according to the identification information. Specifically, the encrypted storage area of the device in the update startup mode corresponds to the private data corresponding to the contact information in the SharedPreference.
其中,步骤611~612对应的是电话应用程序的原生操作步骤,步骤613~616对应的是新增操作步骤。Wherein, steps 611 to 612 correspond to the original operation steps of the phone application, and steps 613 to 616 correspond to newly added operation steps.
请参看图6b,电话应用程序更新联系人信息的处理流程包括:Referring to Fig. 6b, the processing flow of updating the contact information by the phone application includes:
621,当接收到电话应用程序的联系人信息的数据更新指令时,获取待更新的联系人信息。621. Acquire the contact information to be updated when the data update instruction of the contact information of the phone application is received.
622,根据获取的待更新的联系人信息更新移动终端的正常模式下的凭证加密存储区的联系人数据库。622. Update the contact database of the credential encryption storage area in the normal mode of the mobile terminal according to the acquired contact information to be updated.
623,获取待更新的联系人信息对应的标识信息。623: Acquire identification information corresponding to the contact information to be updated.
624,根据标识信息和待更新的联系人信息,更新该联系人信息在启动模式下联系人信息对应的隐私数据。624 , according to the identification information and the contact information to be updated, update the privacy data corresponding to the contact information in the startup mode of the contact information.
其中,步骤621~622对应的是电话应用程序的原生操作步骤,步骤623~624对应的是新增操作步骤。Wherein, steps 621-622 correspond to the native operation steps of the phone application, and steps 623-624 correspond to newly-added operation steps.
其中电话应用程序的处理流程还包括电话应用程序的删除联系人信息的处理流程。电话应用程序的删除联系人信息的处理流程与电话应用程序的更新联系人信息的处理流程一致。可以理解地,在电话应用程序的删除联系人信息的处理流程中,将上述电话应用程序的更新联系人信息的处理流程所对应步骤中的数据更新指令对应更改为数据删除指令,将待更新对应更改为待删除,将更新对应更改为删除等,为了简洁,在此不再赘述。The processing flow of the phone application further includes the processing flow of deleting the contact information of the phone application. The processing flow of deleting contact information of the phone application is the same as the processing flow of updating contact information of the phone application. It can be understood that, in the processing flow of deleting contact information of the phone application, the data update instructions in the corresponding steps of the processing flow of updating contact information of the above-mentioned phone application are correspondingly changed to data deletion instructions, and the corresponding steps to be updated are changed. Change it to pending deletion, and change the update correspondence to deletion, etc. For brevity, they will not be repeated here.
请参看图6c,电话应用程序查询联系人信息的处理流程包括如下步骤:Referring to Fig. 6c, the processing flow for querying contact information by the phone application includes the following steps:
631,若检测到移动终端来电,电话应用程序启动通话界面,并获取来电联系人的标识信息,如来电联系人的电话号码。631 , if an incoming call from the mobile terminal is detected, the phone application program starts a call interface, and acquires identification information of the caller contact, such as the phone number of the caller contact.
632,检测移动终端是否处于启动模式。632. Detect whether the mobile terminal is in the startup mode.
633,若处于启动模式,则根据来电联系人的标识信息从设备加密存储区读取来电联系人对应的隐私数据。633. If in the startup mode, read the private data corresponding to the incoming call contact from the encrypted storage area of the device according to the identification information of the incoming call contact.
具体地,从设备加密存储区对应的SharedPreference中读取来电联系人对应的隐私数据。其中,设备加密存储区保存的来电联系人的隐私数据包括联系人姓名、联系人电话号码等在启动模式下需使用的信息。接着执行步骤635。Specifically, the private data corresponding to the incoming call contact is read from the SharedPreference corresponding to the encrypted storage area of the device. The private data of the incoming call contact stored in the encrypted storage area of the device includes information to be used in the startup mode, such as the name of the contact, the phone number of the contact, and the like. Next, step 635 is executed.
634,若处于正常模式,则根据来电联系人的标识信息从凭证加密存储区的联系人数据库中读取来电联系人的隐私数据。接着执行步骤635。634. If in the normal mode, read the private data of the incoming contact from the contact database in the credential encrypted storage area according to the identification information of the incoming contact. Next, step 635 is executed.
635,将读取的隐私数据更新至通话界面。635. Update the read privacy data to the call interface.
根据上述实施例所描述的方法,本实施例将从数据读取装置的角度进一步进行描述,该数据读取装置具体可以作为独立的实体来实现,也可以集成在移动终端,该移动终端可以包括智能手机、Pad、穿戴式设备、机器人等终端设备。移动终端中包括预设应用程序,该预设应用程序可以在移动终端的启动模式(Direct Boot Mode)下运行。需要注意的是,可以在启动模式下运行的预设应用程序一定可以在正常模式下运行。优选的,该移动终端为安装有安卓系统的移动终端。According to the methods described in the above embodiments, this embodiment will be further described from the perspective of a data reading device. Specifically, the data reading device may be implemented as an independent entity, or may be integrated in a mobile terminal. The mobile terminal may include Smartphones, Pads, wearable devices, robots and other terminal devices. The mobile terminal includes a preset application program, and the preset application program can run in a startup mode (Direct Boot Mode) of the mobile terminal. It's important to note that preset apps that can run in boot mode must work in normal mode. Preferably, the mobile terminal is a mobile terminal installed with an Android system.
请参阅图7,图7具体描述了本申请实施例提供的数据读取装置,应用于移动终端中,该数据读取装置可以包括:获取单元701、备份单元702以及读取单元703。其中:Please refer to FIG. 7 . FIG. 7 specifically describes the data reading device provided by the embodiment of the present application. When applied to a mobile terminal, the data reading device may include an acquisition unit 701 , a backup unit 702 and a reading unit 703 . in:
获取单元701,用于获取预设应用程序的隐私数据。The obtaining unit 701 is configured to obtain private data of a preset application.
获取单元701,具体用于从移动终端的正常模式下的凭证加密存储区,获取预设应用程序的隐私数据;或者若接收到预设应用程序的数据增加指令,根据数据增加指令获取预设应用程序待新增的隐私数据。The obtaining unit 701 is specifically configured to obtain the privacy data of the preset application program from the credential encryption storage area in the normal mode of the mobile terminal; or if a data addition instruction of the preset application program is received, obtain the preset application program according to the data addition instruction The privacy data to be added by the program.
进一步地,获取单元701,具体用于从移动终端的正常模式下的凭证加密存储区,获取预设应用程序的隐私数据和隐私数据对应的隐私数据标识;或者Further, the obtaining unit 701 is specifically configured to obtain the privacy data of the preset application and the privacy data identifier corresponding to the privacy data from the credential encryption storage area in the normal mode of the mobile terminal; or
若接收到预设应用程序的数据增加指令,根据数据增加指令获取预设应用程序新增的隐私数据和隐私数据对应的隐私数据标识。If the data addition instruction of the preset application program is received, the privacy data newly added by the preset application program and the privacy data identifier corresponding to the privacy data are obtained according to the data addition instruction.
在一实施例中,获取单元701,用于获取预设应用程序在移动终端的启动模式下需使用的隐私数据和隐私数据所对应的隐私数据标识。In one embodiment, the obtaining unit 701 is configured to obtain the privacy data to be used by the preset application in the startup mode of the mobile terminal and the privacy data identifier corresponding to the privacy data.
具体地,获取单元701,具体用于从移动终端的正常模式下的凭证加密存储区,获取预设应用程序在移动终端的启动模式下需使用的隐私数据;或者Specifically, the obtaining unit 701 is specifically configured to obtain the privacy data to be used by the preset application in the startup mode of the mobile terminal from the credential encryption storage area in the normal mode of the mobile terminal; or
若接收到预设应用程序的数据增加指令,根据数据增加指令获取预设应用程序待新增的在移动终端的启动模式下需使用的隐私数据。If the data addition instruction of the preset application program is received, according to the data addition instruction, the privacy data to be added by the preset application program and to be used in the startup mode of the mobile terminal is obtained.
备份单元702,用于将隐私数据备份至移动终端的启动模式下的设备加密存储区。The backup unit 702 is configured to back up the private data to the device encrypted storage area in the startup mode of the mobile terminal.
若获取单元701获取了隐私数据标识,对应地,备份单元702用于将隐私数据和对应的隐私数据标识备份至移动终端的启动模式下的设备加密存储区。If the acquisition unit 701 acquires the privacy data identifier, correspondingly, the backup unit 702 is configured to back up the privacy data and the corresponding privacy data identifier to the device encryption storage area in the startup mode of the mobile terminal.
读取单元703,用于在运行预设应用程序时,若移动终端处于启动模式,则从设备加密存储区读取隐私数据;若移动终端处于启动模式,则从启动模式下的设备加密存储区读取隐私数据。The reading unit 703 is configured to read privacy data from the device encrypted storage area if the mobile terminal is in the startup mode when running the preset application program; if the mobile terminal is in the startup mode, from the device encrypted storage area in the startup mode Read private data.
读取单元703,具体用于在运行预设应用程序时,检测移动终端是否处于启动模式;若移动终端处于正常模式,则从正常模式下的凭证加密存储区读取隐私数据;移动终端处于启动模式,则从启动模式下的设备加密存储区读取隐私数据。The reading unit 703 is specifically configured to detect whether the mobile terminal is in the startup mode when running the preset application program; if the mobile terminal is in the normal mode, read privacy data from the credential encryption storage area in the normal mode; the mobile terminal is in the startup mode mode, private data is read from the encrypted storage area of the device in boot mode.
在一实施例中,如图7所示,数据读取装置还可以包括监听单元704。监听单元704,用于若移动终端处于启动模式,监听模式切换的广播消息,该模式切换为从启动模式切换至正常模式。对应的,读取单元703,还用于若监听到模式切换的广播消息,根据隐私数据标识从正常模式下的凭证加密存储区重新读取隐私数据。In one embodiment, as shown in FIG. 7 , the data reading apparatus may further include a monitoring unit 704 . The monitoring unit 704 is configured to, if the mobile terminal is in the activation mode, monitor the broadcast message of the mode switching, the mode switching is to switch from the activation mode to the normal mode. Correspondingly, the reading unit 703 is further configured to re-read the privacy data from the credential encryption storage area in the normal mode according to the privacy data identifier if the mode switching broadcast message is monitored.
在一实施例中,如图7所示,数据读取装置还可以包括数据操作单元705。其中,数据操作单元705,用于若接收到移动终端的凭证加密存储区的数据操作指令,根据数据操作指令确定操作类型、待操作数据和待操作数据对应的数据标识;检测数据标识是否包括隐私数据标识;若包括隐私数据标识,根据隐私数据标识获取设备加密存储区中对应的隐私数据;根据操作类型和待操作数据,对设备加密存储区中的隐私数据进行操作。In one embodiment, as shown in FIG. 7 , the data reading apparatus may further include a data operation unit 705 . Wherein, the data operation unit 705 is used to determine the operation type, the data to be operated and the data identifier corresponding to the data to be operated according to the data operation instruction if the data operation instruction of the credential encryption storage area of the mobile terminal is received; to detect whether the data identifier includes privacy Data identifier; if the private data identifier is included, obtain the corresponding private data in the encrypted storage area of the device according to the private data identifier; operate the private data in the encrypted storage area of the device according to the operation type and the data to be operated.
具体地,数据操作单元705包括数据新增单元、数据更新单元、数据删除单元等。其中,Specifically, the data operation unit 705 includes a data addition unit, a data update unit, a data deletion unit, and the like. in,
数据新增单元,用于接收预设应用程序的数据新增指令,并获取待新增数据;待新增数据添加至正常模式下的凭证加密存储区;获取待新增数据的数据标识,作为隐私数据标识;根据待新增数据,获取预设应用程序在移动终端的启动模式下需使用的隐私数据;将隐私数据标识和隐私数据备份至启动模式下的设备加密存储区。The data adding unit is used to receive the data adding instruction of the preset application, and obtain the data to be added; the data to be added is added to the credential encryption storage area in the normal mode; the data identifier of the data to be added is obtained as Privacy data identification; according to the data to be added, obtain the privacy data that the preset application needs to use in the startup mode of the mobile terminal; back up the privacy data identification and privacy data to the device encrypted storage area in the startup mode.
数据更新单元,用于接收预设应用程序的数据更新指令,并获取待更新数据;根据待更新数据,将正常模式下的凭证加密存储区对应的数据进行更新;获取待更新数据的数据标识,根据所获取的数据标识确定隐私数据标识;通过隐私数据标识获取启动模式下的设备加密存储区中对应的隐私数据;根据待更新数据,更新设备加密存储区中对应的隐私数据。A data update unit, configured to receive a data update instruction of a preset application, and obtain the data to be updated; update the data corresponding to the credential encryption storage area in the normal mode according to the data to be updated; obtain the data identifier of the data to be updated, The private data identifier is determined according to the acquired data identifier; the corresponding private data in the device encrypted storage area in the startup mode is obtained through the private data identifier; and the corresponding private data in the device encrypted storage area is updated according to the data to be updated.
数据删除单元,用于接收预设应用程序的数据删除指令,并获取待删除数据;根据待删除数据,将正常模式下的凭证加密存储区对应的数据进行删除;获取待删除数据的数据标识,根据所获取的数据标识确定隐私数据标识;通过隐私数据标识获取启动模式下的设备加密存储区中对应的隐私数据;删除设备加密存储区中对应的隐私数据。The data deletion unit is used to receive the data deletion instruction of the preset application program and obtain the data to be deleted; according to the data to be deleted, delete the data corresponding to the credential encrypted storage area in the normal mode; to obtain the data identifier of the data to be deleted, The privacy data identifier is determined according to the acquired data identifier; the privacy data corresponding to the device encrypted storage area in the startup mode is obtained through the privacy data identifier; the corresponding privacy data in the device encrypted storage area is deleted.
具体实施时,以上各个模块和/或单元可以作为独立的实体来实现,也可以进行任意组合,作为同一或若干个实体来实现,以上各个模块和/或单元的具体实施可参见前面的方法实施例,具体可以达到的有益效果也请参看前面的方法实施例中的有益效果,在此不再赘述。During specific implementation, the above modules and/or units can be implemented as independent entities, or can be arbitrarily combined to be implemented as the same or several entities. The specific implementation of the above modules and/or units can refer to the previous method implementation. For example, for the specific beneficial effects that can be achieved, please refer to the beneficial effects in the foregoing method embodiments, which will not be repeated here.
另外,本申请实施例还提供一种移动终端,该移动终端可以是智能手机、平板电脑、机器人等包括至少一个传感器的设备。如图8所示,移动终端800包括处理器801、存储器802。其中,处理器801与存储器802电性连接。In addition, an embodiment of the present application further provides a mobile terminal, where the mobile terminal may be a device including at least one sensor, such as a smartphone, a tablet computer, and a robot. As shown in FIG. 8 , the mobile terminal 800 includes a processor 801 and a memory 802 . The processor 801 is electrically connected to the memory 802 .
处理器801是移动终端800的控制中心,利用各种接口和线路连接整个移动终端的各个部分,通过运行或加载存储在存储器802内的应用程序,以及调用存储在存储器802内的数据,执行移动终端的各种功能和处理数据,从而对移动终端进行整体监控。The processor 801 is the control center of the mobile terminal 800, uses various interfaces and lines to connect various parts of the entire mobile terminal, and executes the movement by running or loading the application program stored in the memory 802 and calling the data stored in the memory 802. Various functions of the terminal and processing data, so as to monitor the mobile terminal as a whole.
在本实施例中,移动终端800中的处理器801会按照如下的步骤,将一个或一个以上的应用程序的进程对应的指令加载到存储器802中,并由处理器801来运行存储在存储器802中的应用程序,从而实现各种功能上述所述的数据读取方法任一实施例中的步骤。In this embodiment, the processor 801 in the mobile terminal 800 loads the instructions corresponding to the processes of one or more application programs into the memory 802 according to the following steps, and the processor 801 executes the instructions stored in the memory 802 . The application program in the above-mentioned data reading method realizes various functions of the steps in any embodiment of the above-mentioned data reading method.
该移动终端可以实现本申请实施例所提供的数据读取方法任一实施例中的步骤,因此,可以实现本发明实施例所提供的任一数据读取方法所能实现的有益效果,详见前面的实施例,在此不再赘述。The mobile terminal can implement the steps in any of the data reading methods provided in the embodiments of the present application, and therefore, can achieve the beneficial effects that can be achieved by any of the data reading methods provided in the embodiments of the present invention. For details, see details The foregoing embodiments are not repeated here.
图9示出了本发明实施例提供的移动终端的具体结构框图,该移动终端可以用于实施上述实施例中提供的数据读取方法。该移动终端900可以为移动终端、穿戴式设备、带有触摸屏的PC端、带有触摸屏的机器人等。该移动终端中包括触摸屏,该触摸屏可用于接收输入的数字或字符信息。FIG. 9 shows a specific structural block diagram of a mobile terminal provided by an embodiment of the present invention, and the mobile terminal can be used to implement the data reading method provided in the above-mentioned embodiment. The mobile terminal 900 may be a mobile terminal, a wearable device, a PC terminal with a touch screen, a robot with a touch screen, and the like. The mobile terminal includes a touch screen, and the touch screen can be used to receive inputted number or character information.
RF电路910用于接收以及发送电磁波,实现电磁波与电信号的相互转换,从而与通讯网络或者其他设备进行通讯。RF电路910可包括各种现有的用于执行这些功能的电路元件,例如,天线、射频收发器、数字信号处理器、加密/解密芯片、用户身份模块(SIM)卡、存储器等等。RF电路910可与各种网络如互联网、企业内部网、无线网络进行通讯或者通过无线网络与其他设备进行通讯。上述的无线网络可包括蜂窝式电话网、无线局域网或者城域网。上述的无线网络可以使用各种通信标准、协议及技术,包括但并不限于全球移动通信系统(Global
System for Mobile Communication, GSM)、增强型移动通信技术(Enhanced
Data GSM Environment, EDGE),宽带码分多址技术(Wideband Code
Division Multiple Access, WCDMA),码分多址技术(Code Division
Access, CDMA)、时分多址技术(Time Division Multiple Access, TDMA),无线保真技术(Wireless Fidelity,
Wi-Fi)(如美国电气和电子工程师协会标准 IEEE 802.11a, IEEE 802.11b, IEEE802.11g 和/或 IEEE 802.11n)、网络电话(Voice
over Internet Protocol, VoIP)、全球微波互联接入(Worldwide
Interoperability for Microwave Access,
Wi-Max)、其他用于邮件、即时通讯及短消息的协议,以及任何其他合适的通讯协议,甚至可包括那些当前仍未被开发出来的协议。The RF circuit 910 is used for receiving and sending electromagnetic waves, realizing mutual conversion between electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices. RF circuitry 910 may include various existing circuit elements for performing these functions, eg, antennas, radio frequency transceivers, digital signal processors, encryption/decryption chips, Subscriber Identity Module (SIM) cards, memory, and the like. The RF circuit 910 may communicate with various networks such as the Internet, an intranet, a wireless network, or with other devices over a wireless network. The aforementioned wireless network may include a cellular telephone network, a wireless local area network, or a metropolitan area network. The above-mentioned wireless networks can use various communication standards, protocols and technologies, including but not limited to the Global System for Mobile Communications (Global
System for Mobile Communication, GSM), Enhanced Mobile Communication Technology (Enhanced
Data GSM Environment, EDGE), Wideband Code Division Multiple Access (Wideband Code
Division Multiple Access, WCDMA), code division multiple access technology (Code Division
Access, CDMA), Time Division Multiple Access (TDMA), Wireless Fidelity (Wireless Fidelity,
Wi-Fi) (e.g. Institute of Electrical and Electronics Engineers standards IEEE 802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n), Internet telephony (Voice
over Internet Protocol, VoIP), Worldwide Interconnection for Microwave Access (Worldwide
Interoperability for Microwave Access,
Wi-Max), other protocols for mail, instant messaging, and short messaging, and any other suitable communication protocols, even those that are not currently being developed.
存储器920可用于存储软件程序以及模块,如上述实施例中对应的程序指令/模块,处理器980通过运行存储在存储器920内的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器920可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器920可进一步包括相对于处理器980远程设置的存储器,这些远程存储器可以通过网络连接至移动终端900。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 920 may be used to store software programs and modules, such as corresponding program instructions/modules in the above embodiments. The processor 980 executes various functional applications and data processing by running the software programs and modules stored in the memory 920 . Memory 920 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some instances, the memory 920 may further include memory located remotely from the processor 980, and these remote memories may be connected to the mobile terminal 900 through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
输入单元930可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。具体地,输入单元930可包括触敏表面931以及其他输入设备932。触敏表面931,也称为触摸显示屏(触摸屏)或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面931上或在触敏表面931附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面931可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器980,并能接收处理器980发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面931。除了触敏表面931,输入单元930还可以包括其他输入设备932。具体地,其他输入设备932可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 930 may be used to receive input numerical or character information, and generate keyboard, mouse, joystick, optical or trackball signal input related to user settings and function control. Specifically, the input unit 930 may include a touch-sensitive surface 931 as well as other input devices 932 . A touch-sensitive surface 931, also known as a touch display (touch screen) or a trackpad, collects the user's touch operations on or near it (such as the user's finger, stylus, etc., any suitable object or attachment on the touch-sensitive surface 931 operation on or near the touch-sensitive surface 931), and actuate the corresponding connection device according to a preset program. Optionally, the touch-sensitive surface 931 may include two parts, a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch orientation, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it to the touch controller. To the processor 980, and can receive the command sent by the processor 980 and execute it. In addition, the touch-sensitive surface 931 may be implemented using resistive, capacitive, infrared, and surface acoustic wave types. In addition to the touch-sensitive surface 931 , the input unit 930 may also include other input devices 932 . Specifically, other input devices 932 may include, but are not limited to, one or more of physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, joysticks, and the like.
显示单元940可用于显示由用户输入的信息或提供给用户的信息以及移动终端900的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元940可包括显示面板941,可选的,可以采用LCD(Liquid Crystal
Display,液晶显示器)、OLED(Organic
Light-Emitting Diode,有机发光二极管)等形式来配置显示面板941。进一步的,触敏表面931可覆盖显示面板941,当触敏表面931检测到在其上或附近的触摸操作后,传送给处理器980以确定触摸事件的类型,随后处理器980根据触摸事件的类型在显示面板941上提供相应的视觉输出。虽然在图中,触敏表面931与显示面板941是作为两个独立的部件来实现输入和输出功能,但是可以理解地,将触敏表面931与显示面板941集成而实现输入和输出功能。The display unit 940 may be used to display information input by or provided to the user and various graphical user interfaces of the mobile terminal 900, which may be composed of graphics, text, icons, videos, and any combination thereof. The display unit 940 may include a display panel 941, and optionally, an LCD (Liquid Crystal
Display, liquid crystal display), OLED (Organic
The display panel 941 is configured in the form of Light-Emitting Diode, organic light-emitting diode) or the like. Further, the touch-sensitive surface 931 may cover the display panel 941, and when the touch-sensitive surface 931 detects a touch operation on or near it, it transmits it to the processor 980 to determine the type of the touch event, and then the processor 980 determines the type of the touch event according to the touch event. Type provides corresponding visual output on display panel 941 . Although in the figure, the touch-sensitive surface 931 and the display panel 941 are used as two separate components to realize the input and output functions, it is understood that the touch-sensitive surface 931 and the display panel 941 are integrated to realize the input and output functions.
移动终端900还可包括至少一种传感器950,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板941的亮度,接近传感器可在翻盖合上或者关闭时产生中断。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等; 至于移动终端900还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The mobile terminal 900 may also include at least one sensor 950, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 941 according to the brightness of the ambient light, and the proximity sensor may generate an interruption when the flip is closed or closed. As a kind of motion sensor, the gravitational acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes), and can detect the magnitude and direction of gravity when it is stationary. games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. that can also be configured on the mobile terminal 900, here No longer.
音频电路960、扬声器961,传声器962可提供用户与移动终端900之间的音频接口。音频电路960可将接收到的音频数据转换后的电信号,传输到扬声器961,由扬声器961转换为声音信号输出;另一方面,传声器962将收集的声音信号转换为电信号,由音频电路960接收后转换为音频数据,再将音频数据输出处理器980处理后,经RF电路910以发送给比如另一终端,或者将音频数据输出至存储器920以便进一步处理。音频电路960还可能包括耳塞插孔,以提供外设耳机与移动终端900的通信。The audio circuit 960 , the speaker 961 , and the microphone 962 may provide an audio interface between the user and the mobile terminal 900 . The audio circuit 960 can convert the received audio data into an electrical signal, and transmit it to the speaker 961, and the speaker 961 converts it into a sound signal for output; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal, which is converted by the audio circuit 960 After receiving, it is converted into audio data, and then the audio data is output to the processor 980 for processing, and then sent to, for example, another terminal through the RF circuit 910, or the audio data is output to the memory 920 for further processing. The audio circuit 960 may also include an earplug jack to provide communication between a peripheral headset and the mobile terminal 900 .
移动终端900通过传输模块970(例如Wi-Fi模块)可以帮助用户接收请求、发送信息等,它为用户提供了无线的宽带互联网访问。虽然图示出了传输模块970,但是可以理解的是,其并不属于移动终端900的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。The mobile terminal 900 can help the user to receive requests, send information, etc. through the transmission module 970 (eg, a Wi-Fi module), which provides the user with wireless broadband Internet access. Although the figure shows the transmission module 970, it can be understood that it is not an essential component of the mobile terminal 900, and can be completely omitted as required within the scope of not changing the essence of the invention.
处理器980是移动终端900的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器920内的软件程序和/或模块,以及调用存储在存储器920内的数据,执行移动终端900的各种功能和处理数据,从而对移动终端进行整体监控。可选的,处理器980可包括一个或多个处理核心;在一些实施例中,处理器980可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解地,上述调制解调处理器也可以不集成到处理器980中。The processor 980 is the control center of the mobile terminal 900, uses various interfaces and lines to connect various parts of the entire mobile phone, runs or executes the software programs and/or modules stored in the memory 920, and calls the data stored in the memory 920. , perform various functions of the mobile terminal 900 and process data, so as to perform overall monitoring of the mobile terminal. Optionally, the processor 980 may include one or more processing cores; in some embodiments, the processor 980 may integrate an application processor and a modem processor, wherein the application processor mainly handles the operating system, user interface and Applications, etc., the modem processor mainly deals with wireless communication. It can be understood that the above-mentioned modulation and demodulation processor may not be integrated into the processor 980 .
移动终端900还包括给各个部件供电的电源990(比如电池),在一些实施例中,电源可以通过电源管理系统与处理器980逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源990还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。The mobile terminal 900 also includes a power source 990 (such as a battery) for powering various components. In some embodiments, the power source can be logically connected to the processor 980 through a power management system, so as to manage charging, discharging, and power consumption through the power management system. management and other functions. Power supply 990 may also include one or more DC or AC power sources, recharging systems, power failure detection circuits, power converters or inverters, power status indicators, and any other components.
尽管未示出,移动终端900还包括摄像头(如前置摄像头、后置摄像头)、蓝牙模块等,在此不再赘述。具体在本实施例中,移动终端的显示单元是触摸屏显示器,移动终端还包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行一个或者一个以上程序包含用于进行以下操作的指令:Although not shown, the mobile terminal 900 further includes a camera (eg, a front camera, a rear camera), a Bluetooth module, and the like, which will not be repeated here. Specifically in this embodiment, the display unit of the mobile terminal is a touch screen display, the mobile terminal further includes a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be displayed by one or more programs. The above processor executing one or more programs contains instructions for:
获取预设应用程序的隐私数据;将隐私数据备份至所述移动终端的启动模式下的设备加密存储区;在运行预设应用程序时,若移动终端处于启动模式,则从设备加密存储区读取隐私数据。Obtain the privacy data of the preset application; back up the privacy data to the device encrypted storage area under the startup mode of the mobile terminal; when running the preset application, if the mobile terminal is in the startup mode, read from the device encrypted storage area access private data.
具体实施时,以上各个模块可以作为独立的实体来实现,也可以进行任意组合,作为同一或若干个实体来实现,以上各个模块的具体实施可参见前面的方法实施例,在此不再赘述。During specific implementation, the above modules can be implemented as independent entities, or can be arbitrarily combined to be implemented as the same or several entities. The specific implementation of the above modules can refer to the previous method embodiments, which will not be repeated here.
本领域普通技术人员可以理解,上述实施例的各种方法中的全部或部分步骤可以通过指令来完成,或通过指令控制相关的硬件来完成,该指令可以存储于一计算机可读存储介质中,并由处理器进行加载和执行。为此,本发明实施例提供一种存储介质,其中存储有多条指令,该指令能够被处理器进行加载,以执行本发明实施例所提供的数据读取方法中任一实施例的步骤。Those of ordinary skill in the art can understand that all or part of the steps in the various methods of the above-mentioned embodiments can be completed by instructions, or by instructions that control relevant hardware, and the instructions can be stored in a computer-readable storage medium, and loaded and executed by the processor. To this end, the embodiments of the present invention provide a storage medium, in which a plurality of instructions are stored, and the instructions can be loaded by a processor to execute the steps of any one of the data reading methods provided by the embodiments of the present invention.
其中,该存储介质可以包括:只读存储器(ROM,Read
Only Memory)、随机存取记忆体(RAM,Random
Access Memory)、磁盘或光盘等。Wherein, the storage medium may include: a read-only memory (ROM, Read
Only Memory), random access memory (RAM, Random
Access Memory), disk or CD, etc.
由于该存储介质中所存储的指令,可以执行本发明实施例所提供的数据读取方法任一实施例中的步骤,因此,可以实现本发明实施例所提供的任数据读取方法所能实现的有益效果,详见前面的实施例,在此不再赘述。Because the instructions stored in the storage medium can execute the steps in any embodiment of the data reading method provided by the embodiment of the present invention, any data reading method provided by the embodiment of the present invention can be implemented. For the beneficial effects, please refer to the previous embodiments for details, which will not be repeated here.
以上对本申请实施例所提供的一种数据读取方法、装置、存储介质和移动终端进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。The data reading method, device, storage medium and mobile terminal provided by the embodiments of the present application have been described in detail above. The principles and implementations of the present application are described with specific examples in this paper. It is only used to help understand the method of the present application and its core idea; at the same time, for those skilled in the art, according to the idea of the present application, there will be changes in the specific implementation and application scope. The contents of the description should not be construed as limiting the application.
Claims (20)
- 一种数据读取方法,应用于移动终端中,包括:A data reading method, applied to a mobile terminal, includes:获取预设应用程序的隐私数据;Obtain private data of preset applications;将所述隐私数据备份至所述移动终端的启动模式下的设备加密存储区;backing up the privacy data to the device encryption storage area in the startup mode of the mobile terminal;在运行预设应用程序时,若所述移动终端处于所述启动模式,则从所述设备加密存储区读取所述隐私数据。When running a preset application, if the mobile terminal is in the startup mode, the private data is read from the device encrypted storage area.
- 根据权利要求1所述的数据读取方法,其中,所述数据读取方法还包括:The data reading method according to claim 1, wherein the data reading method further comprises:若所述移动终端处于正常模式,则从所述正常模式下的凭证加密存储区读取所述隐私数据。If the mobile terminal is in the normal mode, the private data is read from the credential encryption storage area in the normal mode.
- 根据权利要求1所述的数据读取方法,其中,所述数据读取方法还包括:The data reading method according to claim 1, wherein the data reading method further comprises:若所述移动终端处于启动模式,监听模式切换的广播消息,所述模式切换为从所述启动模式切换至所述移动终端的正常模式;If the mobile terminal is in the startup mode, monitor a broadcast message of mode switching, and the mode is switched from the startup mode to the normal mode of the mobile terminal;若监听到模式切换的广播消息,从所述正常模式下的凭证加密存储区读取所述隐私数据。If the broadcast message of mode switching is monitored, the privacy data is read from the credential encryption storage area in the normal mode.
- 根据权利要求1所述的数据读取方法,其中,所述获取预设应用程序的隐私数据,包括:The data reading method according to claim 1, wherein the acquiring the privacy data of the preset application program comprises:获取预设应用程序在所述移动终端的启动模式下需使用的隐私数据。Obtain private data to be used by the preset application in the startup mode of the mobile terminal.
- 根据权利要求4所述的数据读取方法,其中,所述获取预设应用程序在所述移动终端的启动模式下需使用的隐私数据,包括:The data reading method according to claim 4, wherein the acquiring the private data to be used by the preset application in the startup mode of the mobile terminal comprises:从所述移动终端的正常模式下的凭证加密存储区,获取预设应用程序在所述移动终端的启动模式下需使用的隐私数据,或者Obtain private data to be used by a preset application in the startup mode of the mobile terminal from the credential encryption storage area in the normal mode of the mobile terminal, or若接收到预设应用程序的数据增加指令,根据所述数据增加指令获取预设应用程序待新增的在所述移动终端的启动模式下需使用的隐私数据。If a data addition instruction of the preset application program is received, the privacy data to be added by the preset application program to be used in the startup mode of the mobile terminal is acquired according to the data addition instruction.
- 根据权利要求1所述的数据读取方法,其中,The data reading method according to claim 1, wherein,所述获取预设应用程序的隐私数据,包括:获取所述隐私数据和所述隐私数据对应的隐私数据标识;The obtaining the privacy data of the preset application includes: obtaining the privacy data and the privacy data identifier corresponding to the privacy data;所述将所述隐私数据备份至所述移动终端的启动模式下的设备加密存储区,包括:将所述隐私数据和所述隐私数据标识备份至所述移动终端的启动模式下的设备加密存储区。The backing up the privacy data to the device encryption storage area in the startup mode of the mobile terminal includes: backing up the privacy data and the privacy data identifier to the device encryption storage area in the startup mode of the mobile terminal Area.
- 根据权利要求6所述的数据读取方法,其中,在所述将所述隐私数据和所述隐私数据标识备份至所述移动终端的启动模式下的设备加密存储区之后,还包括:The data reading method according to claim 6, wherein after the backing up the privacy data and the privacy data identifier to the device encrypted storage area in the startup mode of the mobile terminal, the method further comprises:若接收到所述移动终端的正常模式下的凭证加密存储区的数据操作指令,根据所述数据操作指令确定操作类型、待操作数据和所述待操作数据对应的数据标识;If receiving the data operation instruction of the credential encryption storage area in the normal mode of the mobile terminal, determine the operation type, the data to be operated and the data identifier corresponding to the data to be operated according to the data operation instruction;检测所述数据标识是否包括隐私数据标识;Detecting whether the data identifier includes a privacy data identifier;若包括隐私数据标识,根据所述隐私数据标识获取所述设备加密存储区中对应的隐私数据;If the privacy data identifier is included, obtain the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier;根据所述操作类型和所述待操作数据,对所述隐私数据进行操作。The private data is operated according to the operation type and the data to be operated.
- 根据权利要求7所述的数据读取方法,其中,所述数据操作指令为数据新增指令,所述操作类型为新增,所述待操作数据包括待新增数据,所述待操作数据对应的数据标识包括待新增数据的数据标识;The data reading method according to claim 7, wherein the data operation instruction is a data addition instruction, the operation type is new addition, the to-be-operated data comprises to-be-added data, and the to-be-operated data corresponds to The data identifier includes the data identifier of the data to be added;检测所述数据标识是否包括隐私数据标识,包括:获取所述待新增数据的数据标识,根据所述数据标识确定所述数据标识包括隐私数据标识,并将所述数据标识作为隐私数据标识;Detecting whether the data identifier includes a privacy data identifier includes: acquiring the data identifier of the data to be added, determining that the data identifier includes a privacy data identifier according to the data identifier, and using the data identifier as a privacy data identifier;所述根据所述隐私数据标识获取所述设备加密存储区中对应的隐私数据,包括:根据所述隐私数据标识,获取预设应用程序在移动终端的启动模式下需使用的隐私数据,并将启动模式下需使用的隐私数据作为设备加密存储区中对应的隐私数据;The obtaining the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier includes: obtaining, according to the privacy data identifier, the privacy data to be used by a preset application in the startup mode of the mobile terminal, and storing the data. The private data to be used in the startup mode is used as the corresponding private data in the encrypted storage area of the device;根据所述操作类型和所述待操作数据,对所述隐私数据进行操作,包括:将所述隐私数据标识和所述隐私数据备份至启动模式下的设备加密存储区。Operating the private data according to the operation type and the data to be operated includes: backing up the private data identifier and the private data to an encrypted storage area of the device in the startup mode.
- 根据权利要求7所述的数据读取方法,其中,所述数据操作指令为数据更新指令,所述操作类型为更新,所述待操作数据包括待更新数据,所述待操作数据对应的数据标识包括待更新数据的数据标识;The data reading method according to claim 7, wherein the data operation instruction is a data update instruction, the operation type is update, the to-be-operated data comprises to-be-updated data, and the data identifier corresponding to the to-be-operated data Including the data identifier of the data to be updated;检测所述数据标识是否包括隐私数据标识,包括:获取待更新数据的数据标识,根据所获取的数据标识确定隐私数据标识;Detecting whether the data identifier includes a privacy data identifier includes: acquiring the data identifier of the data to be updated, and determining the privacy data identifier according to the acquired data identifier;根据所述操作类型和所述待操作数据,对所述隐私数据进行操作,包括:根据待更新数据,更新启动模式下的设备加密存储区中对应的隐私数据。Operating the private data according to the operation type and the data to be operated includes: updating the corresponding private data in the encrypted storage area of the device in the startup mode according to the data to be updated.
- 根据权利要求7所述的数据读取方法,其中,所述数据操作指令为数据删除指令,所述操作类型为删除,所述待操作数据包括待删除数据,所述待操作数据对应的数据标识包括待删除数据的数据标识;The data reading method according to claim 7, wherein the data operation instruction is a data deletion instruction, the operation type is deletion, the data to be operated comprises data to be deleted, and the data identifier corresponding to the data to be operated is Including the data identifier of the data to be deleted;检测所述数据标识是否包括隐私数据标识,包括:获取待删除数据的数据标识,根据所获取的数据标识确定隐私数据标识;Detecting whether the data identifier includes a privacy data identifier includes: acquiring the data identifier of the data to be deleted, and determining the privacy data identifier according to the acquired data identifier;根据所述操作类型和所述待操作数据,对所述隐私数据进行操作,包括:根据待删除数据,删除启动模式下的设备加密存储区中对应的所述隐私数据所述隐私数据标识。Operating the privacy data according to the operation type and the data to be operated includes: deleting the privacy data and the privacy data identifier corresponding to the privacy data in the encrypted storage area of the device in the startup mode according to the data to be deleted.
- 一种计算机可读存储介质,所述计算机存储介质中存储有多条指令,所述指令适于由处理器加载以执行如下步骤:A computer-readable storage medium having stored therein a plurality of instructions adapted to be loaded by a processor to perform the steps of:获取预设应用程序的隐私数据;Obtain private data of preset applications;将所述隐私数据备份至所述移动终端的启动模式下的设备加密存储区;backing up the privacy data to the device encryption storage area in the startup mode of the mobile terminal;在运行预设应用程序时,若所述移动终端处于所述启动模式,则从所述设备加密存储区读取所述隐私数据。When running a preset application, if the mobile terminal is in the startup mode, the private data is read from the device encrypted storage area.
- 根据权利要求11所述的计算机可读存储介质,其中,所述处理器还执行如下步骤:The computer-readable storage medium of claim 11, wherein the processor further performs the steps of:若所述移动终端处于启动模式,监听模式切换的广播消息,所述模式切换为从所述启动模式切换至所述移动终端的正常模式;If the mobile terminal is in the startup mode, monitor the broadcast message of mode switching, and the mode is switched from the startup mode to the normal mode of the mobile terminal;若监听到模式切换的广播消息,从所述正常模式下的凭证加密存储区读取所述隐私数据。If the broadcast message of mode switching is monitored, the privacy data is read from the credential encryption storage area in the normal mode.
- 根据权利要求11所述的计算机可读存储介质,其中,The computer-readable storage medium of claim 11, wherein,所述处理器在执行所述获取预设应用程序的隐私数据的步骤时,具体执行:获取所述隐私数据和所述隐私数据对应的隐私数据标识;When the processor executes the step of obtaining the privacy data of the preset application, the processor specifically executes: obtaining the privacy data and the privacy data identifier corresponding to the privacy data;所述处理器在执行所述将所述隐私数据备份至所述移动终端的启动模式下的设备加密存储区的步骤时,具体执行:将所述隐私数据和所述隐私数据标识备份至所述移动终端的启动模式下的设备加密存储区。When executing the step of backing up the privacy data to the device encryption storage area in the startup mode of the mobile terminal, the processor specifically executes: backing up the privacy data and the privacy data identifier to the device encryption storage area. The device encrypted storage area in the boot mode of the mobile terminal.
- 根据权利要求13所述的计算机可读存储介质,其中,所述处理器在执行所述将所述隐私数据和所述隐私数据标识备份至所述移动终端的启动模式下的设备加密存储区之后,所述处理器还执行如下步骤:14. The computer-readable storage medium of claim 13, wherein after the processor performs the backing up the privacy data and the privacy data identification to a device encrypted storage area in a boot mode of the mobile terminal , the processor also performs the following steps:若接收到所述移动终端的正常模式下的凭证加密存储区的数据操作指令,根据所述数据操作指令确定操作类型、待操作数据和所述待操作数据对应的数据标识;If receiving the data operation instruction of the credential encryption storage area in the normal mode of the mobile terminal, determine the operation type, the data to be operated and the data identifier corresponding to the data to be operated according to the data operation instruction;检测所述数据标识是否包括隐私数据标识;Detecting whether the data identifier includes a privacy data identifier;若包括隐私数据标识,根据所述隐私数据标识获取所述设备加密存储区中对应的隐私数据;If the privacy data identifier is included, obtain the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier;根据所述操作类型和所述待操作数据,对所述隐私数据进行操作。The private data is operated according to the operation type and the data to be operated.
- 根据权利要求14所述的计算机可读存储介质,其中,所述数据操作指令为数据新增指令,所述操作类型为新增,所述待操作数据包括待新增数据,所述待操作数据对应的数据标识包括待新增数据的数据标识;The computer-readable storage medium according to claim 14, wherein the data operation instruction is a data addition instruction, the operation type is addition, the data to be operated comprises data to be added, the data to be operated The corresponding data identifier includes the data identifier of the data to be added;所述处理器在执行所述检测所述数据标识是否包括隐私数据标识的步骤时,具体执行:获取所述待新增数据的数据标识,根据所述数据标识确定所述数据标识包括隐私数据标识,并将所述数据标识作为隐私数据标识;When performing the step of detecting whether the data identifier includes a privacy data identifier, the processor specifically performs: acquiring the data identifier of the data to be added, and determining that the data identifier includes a privacy data identifier according to the data identifier. , and use the data identifier as a privacy data identifier;所述处理器在执行所述根据所述隐私数据标识获取所述设备加密存储区中对应的隐私数据的步骤时,具体执行:根据所述隐私数据标识,获取预设应用程序在移动终端的启动模式下需使用的隐私数据,并将启动模式下需使用的隐私数据作为设备加密存储区中对应的隐私数据;When the processor executes the step of obtaining the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier, the processor specifically executes: obtaining, according to the privacy data identifier, the startup of the preset application program in the mobile terminal. The private data to be used in the mode, and the private data to be used in the startup mode as the corresponding private data in the encrypted storage area of the device;所述处理器在执行所述根据所述操作类型和所述待操作数据,对所述隐私数据进行操作的步骤时,具体执行:将所述隐私数据标识和所述隐私数据备份至启动模式下的设备加密存储区。When the processor performs the step of operating the privacy data according to the operation type and the data to be operated, the processor specifically performs: backing up the privacy data identifier and the privacy data to the startup mode. device encrypted storage.
- 一种移动终端,所述移动终端包括处理器和存储器,所述处理器与所述存储器电性连接,所述存储器用于存储指令和数据,所述处理器用于运行所述指令并调用所述数据,以执行如下步骤:A mobile terminal, the mobile terminal includes a processor and a memory, the processor is electrically connected to the memory, the memory is used for storing instructions and data, and the processor is used for running the instructions and calling the data to perform the following steps:获取预设应用程序的隐私数据;Obtain private data of preset applications;将所述隐私数据备份至所述移动终端的启动模式下的设备加密存储区;backing up the privacy data to the device encryption storage area in the startup mode of the mobile terminal;在运行预设应用程序时,若所述移动终端处于所述启动模式,则从所述设备加密存储区读取所述隐私数据。When running a preset application, if the mobile terminal is in the startup mode, the private data is read from the device encrypted storage area.
- 根据权利要求16所述的移动终端,其中,所述处理器还执行如下步骤:The mobile terminal of claim 16, wherein the processor further performs the steps of:若所述移动终端处于启动模式,监听模式切换的广播消息,所述模式切换为从所述启动模式切换至所述移动终端的正常模式;If the mobile terminal is in the startup mode, monitor the broadcast message of mode switching, and the mode is switched from the startup mode to the normal mode of the mobile terminal;若监听到模式切换的广播消息,从所述正常模式下的凭证加密存储区读取所述隐私数据。If the broadcast message of mode switching is monitored, the privacy data is read from the credential encryption storage area in the normal mode.
- 根据权利要求16所述的移动终端,其中,The mobile terminal of claim 16, wherein,所述处理器在执行所述获取预设应用程序的隐私数据的步骤时,具体执行:获取所述隐私数据和所述隐私数据对应的隐私数据标识;When the processor executes the step of obtaining the privacy data of the preset application, the processor specifically executes: obtaining the privacy data and the privacy data identifier corresponding to the privacy data;所述处理器在执行所述将所述隐私数据备份至所述移动终端的启动模式下的设备加密存储区的步骤时,具体执行:将所述隐私数据和所述隐私数据标识备份至所述移动终端的启动模式下的设备加密存储区。When executing the step of backing up the privacy data to the device encryption storage area in the startup mode of the mobile terminal, the processor specifically executes: backing up the privacy data and the privacy data identifier to the device encryption storage area. The device encrypted storage area in the boot mode of the mobile terminal.
- 根据权利要求18所述的移动终端,其中,所述处理器在执行所述将所述隐私数据和所述隐私数据标识备份至所述移动终端的启动模式下的设备加密存储区之后,所述处理器还执行如下步骤:The mobile terminal according to claim 18, wherein after the processor performs the backup of the privacy data and the privacy data identification to a device encrypted storage area in a startup mode of the mobile terminal, the processor The processor also performs the following steps:若接收到所述移动终端的正常模式下的凭证加密存储区的数据操作指令,根据所述数据操作指令确定操作类型、待操作数据和所述待操作数据对应的数据标识;If receiving the data operation instruction of the credential encryption storage area in the normal mode of the mobile terminal, determine the operation type, the data to be operated and the data identifier corresponding to the data to be operated according to the data operation instruction;检测所述数据标识是否包括隐私数据标识;Detecting whether the data identifier includes a privacy data identifier;若包括隐私数据标识,根据所述隐私数据标识获取所述设备加密存储区中对应的隐私数据;If the privacy data identifier is included, obtain the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier;根据所述操作类型和所述待操作数据,对所述隐私数据进行操作。The private data is operated according to the operation type and the data to be operated.
- 根据权利要求19所述的移动终端,其中,所述数据操作指令为数据新增指令,所述操作类型为新增,所述待操作数据包括待新增数据,所述待操作数据对应的数据标识包括待新增数据的数据标识;The mobile terminal according to claim 19, wherein the data operation instruction is a data addition instruction, the operation type is new addition, the to-be-operated data comprises to-be-added data, and the data corresponding to the to-be-operated data The identifier includes the data identifier of the data to be added;所述处理器在执行所述检测所述数据标识是否包括隐私数据标识的步骤时,具体执行:获取所述待新增数据的数据标识,根据所述数据标识确定所述数据标识包括隐私数据标识,并将所述数据标识作为隐私数据标识;When performing the step of detecting whether the data identifier includes a privacy data identifier, the processor specifically performs: acquiring the data identifier of the data to be added, and determining that the data identifier includes a privacy data identifier according to the data identifier. , and use the data identifier as a privacy data identifier;所述处理器在执行所述根据所述隐私数据标识获取所述设备加密存储区中对应的隐私数据的步骤时,具体执行:根据所述隐私数据标识,获取预设应用程序在移动终端的启动模式下需使用的隐私数据,并将启动模式下需使用的隐私数据作为设备加密存储区中对应的隐私数据;When the processor executes the step of obtaining the corresponding privacy data in the encrypted storage area of the device according to the privacy data identifier, the processor specifically executes: obtaining, according to the privacy data identifier, the startup of the preset application program in the mobile terminal. The private data to be used in the mode, and the private data to be used in the startup mode as the corresponding private data in the encrypted storage area of the device;所述处理器在执行所述根据所述操作类型和所述待操作数据,对所述隐私数据进行操作的步骤时,具体执行:将所述隐私数据标识和所述隐私数据备份至启动模式下的设备加密存储区。When the processor performs the step of operating the privacy data according to the operation type and the data to be operated, the processor specifically performs: backing up the privacy data identifier and the privacy data to the startup mode. device encrypted storage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/007,245 US20230274036A1 (en) | 2020-07-31 | 2020-09-04 | Data reading method, storage medium, and mobile terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010760386.1A CN111858182B (en) | 2020-07-31 | 2020-07-31 | Data reading method and device, storage medium and mobile terminal |
CN202010760386.1 | 2020-07-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022021534A1 true WO2022021534A1 (en) | 2022-02-03 |
Family
ID=72953978
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/113463 WO2022021534A1 (en) | 2020-07-31 | 2020-09-04 | Data reading method, storage medium, and mobile terminal |
Country Status (3)
Country | Link |
---|---|
US (1) | US20230274036A1 (en) |
CN (1) | CN111858182B (en) |
WO (1) | WO2022021534A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114726596B (en) * | 2022-03-25 | 2024-07-16 | 北京沃东天骏信息技术有限公司 | Sensitive data processing method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140372743A1 (en) * | 2013-06-12 | 2014-12-18 | Lookout, Inc. | Method and system for rendering a stolen mobile communications device inoperative |
US20150200934A1 (en) * | 2010-06-30 | 2015-07-16 | Google Inc. | Computing device integrity verification |
CN106921799A (en) * | 2017-02-24 | 2017-07-04 | 深圳市金立通信设备有限公司 | A kind of mobile terminal safety means of defence and mobile terminal |
CN108388451A (en) * | 2018-03-02 | 2018-08-10 | 奇酷互联网络科技(深圳)有限公司 | Method for starting up mobile terminal, device and mobile terminal |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1877539A (en) * | 2005-06-07 | 2006-12-13 | 英业达股份有限公司 | Data backup/recovery system under cold start mode and implementing method therefor |
CN101127784B (en) * | 2007-09-29 | 2011-08-03 | 网秦无限(北京)科技有限公司 | Method and system for quickly obtaining network information service at mobile terminal |
US9805199B2 (en) * | 2015-03-12 | 2017-10-31 | International Business Machines Corporation | Securely booting a computer from a user trusted device |
CN106528470A (en) * | 2016-11-29 | 2017-03-22 | 维沃移动通信有限公司 | Data transmission method and mobile terminal |
CN107632870A (en) * | 2017-09-19 | 2018-01-26 | 维沃移动通信有限公司 | The startup method and terminal of a kind of application |
-
2020
- 2020-07-31 CN CN202010760386.1A patent/CN111858182B/en active Active
- 2020-09-04 US US18/007,245 patent/US20230274036A1/en active Pending
- 2020-09-04 WO PCT/CN2020/113463 patent/WO2022021534A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150200934A1 (en) * | 2010-06-30 | 2015-07-16 | Google Inc. | Computing device integrity verification |
US20140372743A1 (en) * | 2013-06-12 | 2014-12-18 | Lookout, Inc. | Method and system for rendering a stolen mobile communications device inoperative |
CN106921799A (en) * | 2017-02-24 | 2017-07-04 | 深圳市金立通信设备有限公司 | A kind of mobile terminal safety means of defence and mobile terminal |
CN108388451A (en) * | 2018-03-02 | 2018-08-10 | 奇酷互联网络科技(深圳)有限公司 | Method for starting up mobile terminal, device and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
US20230274036A1 (en) | 2023-08-31 |
CN111858182B (en) | 2023-12-19 |
CN111858182A (en) | 2020-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10635449B2 (en) | Method and apparatus for running game client | |
KR102148948B1 (en) | Multi tasking method of electronic apparatus and electronic apparatus thereof | |
CN112055424B (en) | Electronic device and method for switching electronic device | |
EP3553663B1 (en) | Message reminding method for terminal, and terminal | |
CN108684206B (en) | Searching method and device | |
CN106484518B (en) | Display method and device of multi-open application and terminal | |
WO2018049897A1 (en) | Data backup method and device | |
US11082480B2 (en) | File information system management system and method | |
WO2018049934A1 (en) | Data migration method and terminals | |
WO2019071609A1 (en) | Method and terminal device for loading application and upgrading application | |
JP2022506052A (en) | Model file management method and terminal device | |
EP2869604B1 (en) | Method, apparatus and device for processing a mobile terminal resource | |
WO2019184617A1 (en) | Information sharing method and device, computer-readable storage medium and terminal | |
CN112165704A (en) | Information sharing method, earphone box and computer readable storage medium | |
CN110944318B (en) | Lock card setting method and device, storage medium and terminal | |
CN110737476B (en) | Terminal restarting method and device | |
CN110196662B (en) | Method, device, terminal and storage medium for displaying synchronization state | |
US9928134B2 (en) | Method and apparatus for repairing dynamic link library file | |
CN106528231B (en) | A kind of method and apparatus starting application program | |
CN106850957B (en) | Application notification management method and device and mobile terminal | |
CN111026457B (en) | Hardware configuration method and device, storage medium and terminal equipment | |
WO2022021534A1 (en) | Data reading method, storage medium, and mobile terminal | |
CN116382776A (en) | Cross-platform API migration method, device, medium and equipment | |
WO2020027458A1 (en) | Electronic device and method for independently controlling a plurality of displays | |
WO2019084783A1 (en) | Service scheduling method and apparatus, computer device, and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20946590 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20946590 Country of ref document: EP Kind code of ref document: A1 |